Please enable JavaScript.
Coggle requires JavaScript to display documents.
06 WLAN Authentication - Coggle Diagram
06
WLAN Authentication
WEP
Methods
Open Authentication
No Credentials
Encrypted Data Transmission
Sequence
Authentication Request
Authentication Response
Association Request
Association Response
Shared Key Authentication
Challenge Text
Encrypted Data Transmissions
RC4 Cipher
1997 along with IEEE802.11
Retired in 2004
Vulnerabilities
Week Encryption
40 / 104 bit key
Static Keys (Same Key)
Week Initialization Vector
No Forward Secrecy
Susceptible to ARP Spoofing
Not Recommended
Easy Exploitation
Ineffective Data Privacy
Regulatory Requirements
Superior Alternatives
Technological Advancements
WPA
Encryption
TKIP
256-bit Key
AES
Integrity Checks
WPA2
Modes
Personal
(WPA2-PSK)
Simple
Pre-shared key
Vulnerable to Social Engineering Attacks
Enterprise
(WPA2-EAP)
802.1X Authentication
Complex (Authentication Server)
More Secure
Scalable
CCMP
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
Vulnerabilities
KRACK
Key Reinstallation Attacks
WPA 3
Individualized Data Encryption
Wi-Fi Device Provisioning Protocol
(DPP)
NFC
QR Codes
Simultaneous Authentication of Equals Protocol
Strong Brute force Attack Protection