16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

424 Chapter 18<br />

enterprise network. These two environments had distinct security requirements and<br />

different infrastructure capacities to provide security. Therefore, 802.11i specified two<br />

distinct security architectures. For the enterprise network, 802.11i specifies the use of<br />

IEEE 802.1X for key establishment and authentication. As we will see in our discussion<br />

in the next section, 802.1X requires the use of a backend authentication server. Deploying<br />

a back end authentication server is not usually feasible in a home environment. Therefore,<br />

for home deployments of 802.11, 802.11i allows the use of the “ out-of-band mechanism ”<br />

(read manual configuration) for key establishment.<br />

We look at the 802.1X architecture in the next section and see how it results in<br />

the establishment of a Master Key (MK). In this section, we assume that the two<br />

communicating end-points (the STA and the AP) already share a MK which has<br />

either been configured manually at the two end-points (WEP architecture) or has been<br />

established using the authentication process (802.1X architecture). This section looks at<br />

how this MK is used in WPA.<br />

Recall that a major loophole in WEP was the manner 15 in which this master key was<br />

used which made it vulnerable to compromise. WPA solves this problem by reducing<br />

the exposure of the master key, thus making it difficult for an attacker to discover the<br />

master key. To achieve this, WPA adds an additional layer to the key hierarchy used in<br />

WEP. Recall from Section 17.4 that WEP uses the master key for authentication and to<br />

calculate the per-packet key. In effect there is a two-tier key hierarchy in WEP: the master<br />

(preshared secret) key and the per-packet key.<br />

WPA extends the two-tier key-hierarchy of WEP to a multitier hierarchy (See Figure<br />

18.8 ). At the top level is still the master key, referred to as the Pair-wise Master Key<br />

(PMK) in WPA. The next level in the key hierarchy is the PTK which is derived from the<br />

PMK. The final level is the per-packet keys which are generated by feeding the PTK to a<br />

key-mixing function. Compared with the two-tier WEP key hierarchy, the three-tier key<br />

hierarchy of WPA avoids exposing the PMK in each packet by introducing the concept<br />

of PTK.<br />

15<br />

The per-packet key is obtained by simply concatenating the IV with the preshared secret key.<br />

Therefore, a compromised per-packet key exposes the preshared secret key.<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!