Overview
This lecture discusses wireless network security, focusing on authentication, encryption, integrity checks, and the evolution of wireless encryption standards (WEP, WPA, WPA2, WPA3).
Wireless Network Security Concerns
- Wireless networks transmit private and sensitive information that can be intercepted by nearby devices.
- Security measures are essential to prevent unauthorized access and data breaches.
Authentication Methods
- Restricting network access is commonly achieved through authentication, such as usernames, passwords, or multi-factor authentication.
Data Protection: Confidentiality and Integrity
- Encryption ensures confidentiality so data sent over wireless networks can't be easily read if intercepted.
- Message integrity checks verify that received data has not been altered during transmission.
Evolution of Wireless Encryption Standards
- WEP (Wired Equivalent Privacy): First wireless encryption method, but found to have severe cryptographic flaws.
- WPA (Wi-Fi Protected Access): Introduced as a temporary fix to replace WEP, compatible with existing hardware.
- WPA2 (Wi-Fi Protected Access Version 2): Launched in 2004 with stronger security, commonly using CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol).
- WPA3: Introduced in 2018, uses GCMP (Galois Counter Mode Protocol) for improved encryption and integrity; continues to use AES and adds GMAC for message authentication.
Best Practices
- Use the highest available security standard (preferably WPA3) on all wireless network devices.
- Upgrade access points and client devices to support the most secure methods.
Key Terms & Definitions
- Encryption — The process of encoding data to keep it confidential from unauthorized parties.
- Authentication — Verifying the identity of users before granting network access.
- Message Integrity Check — A method to confirm data has not been tampered with in transit.
- WEP — Wired Equivalent Privacy, a now-obsolete wireless encryption protocol.
- WPA/WPA2/WPA3 — Successive generations of Wi-Fi Protected Access protocols that secure wireless communications.
- AES — Advanced Encryption Standard, a strong encryption algorithm used in WPA2/WPA3.
- CCMP — Counter Mode with Cipher Block Chaining Message Authentication Code Protocol, combines encryption and integrity.
- GCMP — Galois Counter Mode Protocol, an advanced encryption and integrity protocol used in WPA3.
Action Items / Next Steps
- Review current wireless devices and upgrade to WPA3 where possible.
- Ensure all wireless communications use the most secure settings available.