Dynamic Encryption Key Generation
Dynamic Encryption Key Generation
11 Layer 2
Dynamic Encryption
Key Generation
802.11 Layer 2 Dynamic Encryption
Key Generation
• Dynamic WEP
• Robust Security Network (RSN)
• RSN Information Element
• Authentication and Key Management (AKM)
• RSNA Key Hierarchy
• 4‐Way Handshake
• Group Handshake
• Peer Key Handshake
• TDLS Peer Key Handshake
• Passphrase‐to‐PSK Mapping
• Roaming and Dynamic Keys
Advantages of Dynamic Encryption
• EAP - TLS, EAP - TTLS, EAP - FAST, EAP - LEAP, and all versions
of PEAP utilize mutual authentication and can provide the
seeding material needed for dynamic encryption key
generation.
• The use of static keys is typically an administrative nightmare.
• Dynamic Keys cannot be compromised by social engineering
attacks because the users have no knowledge of the keys.
• Every user has a different and unique key. If a single user ’ s
encryption key was somehow compromised, none of the
other users would be at risk because every user has a unique
key.
Dynamic WEP encryption
• Dynamic WEP is a nonstandard and legacy encryption solution
that was mostly used with autonomous access points prior to
the widespread use of WLAN controllers.
• After an EAP frame exchange where mutual authentication is
required, both the authentication server and the supplicant
now have information about each other due to the mutual
authentication exchange of credentials.
• These dynamic keys are generated per session per user ,
meaning that every time a supplicant authenticates, a new key
is generated and every user has a unique and separate key.
Dynamic WEP encryption
• This dynamic session key is often referred to as the unicast
key because it is the dynamically generated key that is used
to encrypt and decrypt all unicast 802.11 data frames.
• After the unicast key is created, the authentication server
delivers its copy of the unicast key encapsulated inside a
RADIUS packet to the authenticator.
• A second key exists on the access point known as the
broadcast key .
• The broadcast key is used to encrypt and decrypt all
broadcast and multicast 802.11 data frames.
• Each client station has a unique and separate unicast key, but
every station must share the same broadcast key.
Dynamic WEP
Robust Security Network (RSN)
• The 802.11 - 2007 standard defines what is known as a
robust security network (RSN) and robust security network
associations (RSNAs).
• A security association is a set of policies and keys used to
protect information.
• A robust security network association (RSNA) requires two
802.11 stations (STAs) to establish procedures to
authenticate and associate with each other as well as create
dynamic encryption keys through a process known as the 4 -
Way Handshake .
• CCMP/AES encryption is the mandated encryption method,
while TKIP/RC4 is an optional encryption method.
Robust Security Network (RSN)
• When RSN security associations are used within a
BSS, all of the client station radios have unique
encryption keys that are shared with the radio of
the access point.
• This key is called the pairwise transient key (PTK)
and is used to encrypt/decrypt unicast traffic.
• All the stations share a broadcast key called the
group temporal key (GTK), which is used to
encrypt/decrypt all broadcast and multicast traffic.
Robust Security Network (RSN)
RSN
• A robust security network (RSN) is a network
that allows for the creation of only robust
security network associations (RSNAs).
• In other words, a basic service set (BSS) where
all the stations are using only TKIP/RC4 or
CCMP/AES dynamic keys for encryption would
be considered an RSN.
• Robust security only exists when all devices in
the service set use RSNAs.
RSN
RSN
• Each WLAN has a logical name (SSID) and each WLAN BSS
has a unique Layer 2 identifier, the basic service set
identifier (BSSID).
• The BSSID is typically the MAC address of the access point’s
radio card if only one SSID is being transmitted. However,
most WLAN vendors offer the capability to transmit
multiple SSIDs from an access point radio.
• If multiple SSIDs are transmitted from the same AP radio,
multiple BSSIDs are also needed. As shown in Figure, the
multiple BSSIDs are effectively virtual MAC addresses that
are incremented or derived from the actual physical MAC
address of the AP radio.
Robust Security Network (RSN)
RSN Information Element
• RSN security can be identified by a field found in
certain 802.11 management frames.
• This field is known as the robust security network
information element (RSNIE) and is often referred to
simply as the RSN information element.
• The RSN information element can identify the
encryption capabilities of each station. The RSN
information element will also indicate whether
802.1X/EAP authentication or preshared key (PSK)
authentication is being used.
RSN Information Element
• The RSN information element field is always found in
four different 802.11 management frames: beacon
management frames, probe response frames, association
request frames, and reassociation request frames.
• When stations roam from one access point to another
access point, they use the reassociation request frame to
inform the new access point of the roaming client
station’s security capabilities. The security capabilities
include supported encryption cipher suites and
supported authentication methods.
The RSN Information Element
Authentication and Key Management (AKM)