2.3 - Wireless Encryption
Challenges of Wireless Networks
Wireless networks operate in the air, allowing anyone within range to potentially intercept communication.
Essential to engineer wireless networks to restrict access to authorized users only.
Authentication Requirements
Authentication is required before using the wireless network, commonly through:
Username
Password
Other authentication factors
Unauthorized individuals can see the traffic even if not authenticated.
Importance of Encryption
Critical to enable encryption for all data transmitted over the air to secure communications.
Many wireless technologies include a message integrity check (MIC) to verify the integrity of received data.
Wireless Protocol Analyzer
A tool that can be activated to collect data transmitted over the air.
Highlights the necessity for robust encryption protocols in wireless networks.
Encryption Protocols
WPA2 and WPA3
Traditional 802.11 wireless networks can use:
WPA2 (Wi-Fi Protected Access 2)
WPA3 (Wi-Fi Protected Access 3)
Transition from WEP to WPA (2002)
WEP (Wired Equivalent Privacy) had significant cryptographic vulnerabilities.
Shift to WPA was essential as a temporary solution:
WPA utilized TKIP (Temporal Key Integrity Protocol) for encryption.
TKIP could run on existing access point hardware without the need for upgrades.
WPA was recognized as a stopgap; a more permanent solution was necessary.
Introduction of WPA2 (2004)
WPA2 was developed as a more robust and long-term solution.
Utilized AES (Advanced Encryption Standard), offering stronger encryption than TKIP.
The adoption of WPA2 increased processing power requirements:
Organizations typically upgraded access points to implement WPA2.
WPA2 remains prevalent in current wireless networks.
Features of WPA3 (Introduced in 2018)
Strengthened AES encryption.
Improved security during initial key exchange upon connection.
Support for encryption on open networks:
Automatic creation of encryption keys in public settings (e.g., coffee shops).
Wireless Network Configuration Settings
Open System Configuration
An open network lacks password protection, allowing anyone to connect:
Common in public areas such as coffee shops or hotels.
Personal Network Configurations
For home use, configuring with WPA2 or WPA3 is advisable:
Implementation of a password or passphrase for network protection.
Guests connect by using the shared password.
Pre-shared Key Concept
The shared password for personal network use is referred to as a pre-shared key:
Everyone uses the same key for access.
Enterprise Mode Considerations
WPA2/WPA3 in Enterprise Mode
In business environments, each individual should have unique access credentials:
Use of a centralized authentication database for validation.
This model enhances security by allowing individual login credentials:
Disabling an account when an employee leaves the organization ensures removal of access.