Knowledge

IEEE 802.11i-2004

Source đź“ť

417:"The Protected Frame field is 1 bit in length. The Protected Frame field is set to 1 if the Frame Body field contains information that has been processed by a cryptographic encapsulation algorithm. The Protected Frame field is set to 1 only within data frames of type Data and within management frames of type Management, subtype Authentication. The Protected Frame field is set to 0 in all other frames. When the bit Protected Frame field is set to 1 in a data frame, the Frame Body field is protected utilizing the cryptographic encapsulation algorithm and expanded as defined in Clause 8. Only WEP is allowed as the cryptographic encapsulation algorithm for management frames of subtype Authentication." 174: 180:
each other—that can only be decrypted by using the PMK that they already share—and if decryption of the messages was successful, this proves knowledge of the PMK. The four-way handshake is critical for protection of the PMK from malicious access points—for example, an attacker's SSID impersonating a real access point—so that the client never has to tell the access point its PMK.
179:
The four-way handshake is designed so that the access point (or authenticator) and wireless client (or supplicant) can independently prove to each other that they know the PSK/PMK, without ever disclosing the key. Instead of disclosing the key, the access point (AP) and client encrypt messages to
133:, with implementation of CCMP being mandatory since the confidentiality and integrity mechanisms of TKIP are not as robust as those of CCMP. The main purpose to implement TKIP was that the algorithm should be implementable within the capabilities of most of the old devices supporting only WEP. 121:
to establish and change the appropriate cryptographic keys. The RSN is a security network that only allows the creation of robust security network associations (RSNAs), which are a type of association used by a pair of stations (STAs) if the procedure to establish authentication or association
245:
The Group Temporal Key (GTK) used in the network may need to be updated due to the expiration of a preset timer. When a device leaves the network, the GTK also needs to be updated. This is to prevent the device from receiving any more multicast or broadcast messages from the AP.
148:, which requires the presence of an authentication server). This process ensures that the client station (STA) is authenticated with the access point (AP). After the PSK or 802.1X authentication, a shared secret key is generated, called the 116:
IEEE 802.11i enhances IEEE 802.11-1999 by providing a Robust Security Network (RSN) with two new protocols: the four-way handshake and the group key handshake. These utilize the authentication services and port access control described in
308:
The pairwise key hierarchy utilizes PRF-384 or PRF-512 to derive session-specific keys from a PMK, generating a PTK, which gets partitioned into a KCK and a KEK plus all the temporal keys used by the MAC to protect unicast communication.
222:
sends a nonce-value (ANonce) to the STA together with a Key Replay Counter, which is a number that is used to match each pair of messages sent, and discard replayed messages. The STA now has all the attributes to construct the
277:
of the AES encryption algorithm. CCM combines CTR for confidentiality and CBC-MAC for authentication and integrity. CCM protects the integrity of both the MPDU Data field and selected portions of the IEEE 802.11 MPDU header.
230:(MIC), including authentication, which is really a Message Authentication and Integrity Code (MAIC), and the Key Replay Counter which will be the same as Message 1, to allow AP to match the right Message 1. 312:
The GTK shall be a random number which also gets generated by using PRF-n, usually PRF-128 or PRF-256, in this model, the group key hierarchy takes a GMK (Group Master Key) and generates a GTK.
85:
as an intermediate solution to WEP insecurities. WPA implemented a subset of a draft of 802.11i. The Wi-Fi Alliance refers to their approved, interoperable implementation of the full 802.11i as
1047: 187:
to encrypt the traffic need to be derived. A four-way handshake is used to establish another key called the Pairwise Transient Key (PTK). The PTK is generated by
257:
The AP sends the new GTK to each STA in the network. The GTK is encrypted using the KEK assigned to that STA, and protects the data from tampering, by use of a
304:
PRF-n - Pseudo-random function producing n bits of output, there are the 128, 192, 256, 384 and 512 versions, each of these output these number of bits.
1972: 1967: 1962: 1957: 1952: 1947: 1942: 233:
The AP verifies Message 2, by checking MIC, RSN, ANonce and Key Replay Counter Field, and if valid constructs and sends the GTK with another MIC.
426: 1211: 600: 564: 524: 488: 452: 1254: 2022: 1888: 1629: 1624: 1614: 1609: 1604: 1599: 1594: 1589: 1579: 1574: 1569: 1564: 1554: 1549: 1544: 1539: 1524: 1519: 1514: 1509: 1504: 152:(PMK). In PSK authentication, the PMK is actually the PSK, which is typically derived from the WiFi password by putting it through a 691: 787: 164:. If an 802.1X EAP exchange was carried out, the PMK is derived from the EAP parameters provided by the authentication server. 210:
The actual messages exchanged during the handshake are depicted in the figure and explained below (all messages are sent as
753: 2058: 2048: 897: 141: 236:
The STA verifies Message 3, by checking MIC and Key Replay Counter Field, and if valid sends a confirmation to the AP.
1323: 842: 2117: 1022: 126: 1304: 1279: 552:
RSNA relies on IEEE 802.1X to provide authentication services and uses the IEEE 802.11 key management scheme
1259: 780: 200: 94: 1688: 1249: 952: 867: 847: 761: 161: 2091: 820: 796: 183:
The PMK is designed to last the entire session and should be exposed as little as possible; therefore,
1658: 857: 721:"IEEE 802.11-2007: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications" 31: 1092: 74: 58: 2096: 957: 947: 927: 773: 613: 577: 537: 501: 463: 1269: 830: 258: 227: 78: 62: 2063: 1186: 922: 219: 674: 654: 637: 2122: 1329: 1077: 1007: 675:"IEEE 802.11i-2004 Standard Amendment 6: Medium Access Control (MAC) Security Enhancements" 655:"IEEE 802.11i-2004 Standard Amendment 6: Medium Access Control (MAC) Security Enhancements" 638:"IEEE 802.11i-2004 Standard Amendment 6: Medium Access Control (MAC) Security Enhancements" 173: 8: 695: 192: 149: 130: 1087: 184: 293:
GTK, a hierarchy consisting of a single key to protect multicast and broadcast traffic
1760: 1755: 1735: 1719: 1713: 1708: 1698: 1693: 1683: 1678: 1668: 1663: 1299: 1169: 1129: 35: 1653: 1319: 453:"IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements" 732: 125:
The standard also provides two RSNA data confidentiality and integrity protocols,
34:(WPA2). The draft standard was ratified on 24 June 2004. This standard specifies 1082: 757: 602:
IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements
566:
IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements
526:
IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements
490:
IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements
1937: 1067: 1062: 982: 932: 751: 720: 609: 573: 533: 497: 459: 137: 82: 2111: 2043: 1987: 1982: 1977: 1927: 1922: 1917: 1907: 1883: 1859: 1847: 1836: 1825: 1813: 1808: 1803: 1798: 1785: 1774: 1264: 1244: 1097: 1072: 1002: 892: 837: 301:
L(Str, F, L) - From Str starting from the left, extract bits F through F+L–1.
188: 105: 2027: 2017: 1765: 1750: 1745: 1740: 1730: 1673: 1314: 1309: 1294: 1289: 1284: 1234: 432: 102: 98: 39: 203:. The handshake also yields the GTK (Group Temporal Key), used to decrypt 1899: 1639: 1393: 1274: 1239: 1229: 1206: 1201: 1196: 1191: 1174: 1159: 297:
The description of the key hierarchies uses the following two functions:
196: 118: 54: 27: 2012: 2007: 1339: 1221: 1154: 1149: 1144: 1139: 1134: 1124: 2073: 2053: 1911: 1164: 1057: 1052: 1037: 1027: 1017: 997: 992: 977: 967: 962: 942: 937: 917: 912: 907: 902: 887: 852: 226:
The STA sends its own nonce-value (SNonce) to the AP together with a
204: 51: 1344: 1116: 1107: 825: 815: 810: 274: 2068: 1864: 1830: 1779: 1724: 1619: 1584: 1559: 1534: 1529: 1499: 1494: 1489: 1483: 1477: 1472: 1467: 1462: 1456: 1450: 1445: 1440: 1435: 1429: 1423: 1418: 1413: 1408: 1353: 987: 972: 765: 136:
The initial authentication process is carried out either using a
1931: 1403: 1398: 1388: 1383: 1378: 1373: 1368: 1363: 1358: 1032: 862: 153: 1789: 1644: 1179: 1042: 882: 211: 157: 145: 1012: 877: 872: 724: 61:(WEP), while it was later incorporated into the published 199:, and STA MAC address. The product is then put through a 77:(WEP), which was shown to have security vulnerabilities. 73:
802.11i supersedes the previous security specification,
264:
The STA acknowledges the new GTK and replies to the AP.
429:(WAPI), China's centralized wireless security method 93:(Robust Security Network). 802.11i makes use of the 290:Pairwise key hierarchy, to protect unicast traffic 2109: 46:clause of the original standard with a detailed 427:WLAN Authentication and Privacy Infrastructure 781: 750:Vulnerability in the WPA2 protocol, hole196 122:between them includes the 4-Way Handshake. 81:(WPA) had previously been introduced by the 733:"The Evolution of 802.11 Wireless Security" 26:for short, is an amendment to the original 788: 774: 249:To handle the updating, 802.11i defines a 612:, 2004-07-23, p. 43, archived from 536:, 2004-07-23, p. 14, archived from 500:, 2004-07-23, p. 14, archived from 412: 576:, 2004-07-23, p. 5, archived from 2110: 320: 253:that consists of a two-way handshake: 240: 769: 445: 167: 111: 68: 669: 667: 315: 13: 795: 286:RSNA defines two key hierarchies: 191:the following attributes: PMK, AP 144:exchange through 802.1X (known as 14: 2134: 744: 664: 195:(ANonce), STA nonce (SNonce), AP 281: 268: 172: 275:Counter with CBC-MAC (CCM) mode 692:"Section of MAC frame formats" 684: 647: 630: 593: 557: 517: 481: 101:, whereas WEP and WPA use the 1: 439: 50:clause. In the process, the 462:. 2004-07-23. Archived from 95:Advanced Encryption Standard 7: 420: 162:cryptographic hash function 10: 2139: 2092:IEEE Standards Association 44:Authentication and privacy 2082: 2036: 2000: 1898: 1638: 1338: 1220: 1115: 1106: 803: 32:Wi-Fi Protected Access II 207:and broadcast traffic. 75:Wired Equivalent Privacy 59:Wired Equivalent Privacy 2118:Cryptographic protocols 2097:Category:IEEE standards 154:key derivation function 140:(PSK), or following an 738:. ITFFROC. 2010-04-18. 228:Message Integrity Code 201:pseudo-random function 79:Wi-Fi Protected Access 42:, replacing the short 413:Protected Frame field 273:CCMP is based on the 16:IEEE standard version 326:Frame Control field 327: 321:Frame Control field 251:Group Key Handshake 241:Group key handshake 150:Pairwise Master Key 756:2015-11-13 at the 325: 168:Four-way handshake 112:Protocol operation 69:Replacement of WEP 2105: 2104: 1996: 1995: 410: 409: 357:Power Management 336:Protocol Version 316:MAC frame formats 40:wireless networks 30:, implemented as 20:IEEE 802.11i-2004 2130: 1113: 1112: 790: 783: 776: 767: 766: 739: 737: 728: 707: 706: 704: 703: 694:. Archived from 688: 682: 681: 679: 671: 662: 661: 659: 651: 645: 644: 642: 634: 628: 626: 625: 624: 618: 607: 597: 591: 590: 589: 588: 582: 571: 561: 555: 554: 549: 548: 542: 531: 521: 515: 514: 513: 512: 506: 495: 485: 479: 477: 475: 474: 468: 457: 449: 363:Protected Frame 328: 324: 176: 63:IEEE 802.11-2007 2138: 2137: 2133: 2132: 2131: 2129: 2128: 2127: 2108: 2107: 2106: 2101: 2078: 2032: 1992: 1894: 1642: 1634: 1342: 1334: 1216: 1102: 799: 794: 758:Wayback Machine 747: 742: 735: 731: 719: 710: 701: 699: 690: 689: 685: 677: 673: 672: 665: 657: 653: 652: 648: 640: 636: 635: 631: 622: 620: 619:on May 17, 2005 616: 605: 599: 598: 594: 586: 584: 583:on May 17, 2005 580: 569: 563: 562: 558: 546: 544: 543:on May 17, 2005 540: 529: 523: 522: 518: 510: 508: 507:on May 17, 2005 504: 493: 487: 486: 482: 472: 470: 469:on May 17, 2005 466: 455: 451: 450: 446: 442: 423: 415: 351:More Fragments 323: 318: 284: 271: 243: 170: 114: 71: 38:mechanisms for 17: 12: 11: 5: 2136: 2126: 2125: 2120: 2103: 2102: 2100: 2099: 2094: 2089: 2083: 2080: 2079: 2077: 2076: 2071: 2066: 2061: 2056: 2051: 2046: 2040: 2038: 2034: 2033: 2031: 2030: 2025: 2020: 2015: 2010: 2004: 2002: 1998: 1997: 1994: 1993: 1991: 1990: 1985: 1980: 1975: 1970: 1965: 1960: 1955: 1950: 1945: 1940: 1935: 1925: 1920: 1915: 1904: 1902: 1896: 1895: 1893: 1892: 1880: 1877: 1874: 1871: 1868: 1856: 1853: 1850: 1845: 1842: 1839: 1834: 1822: 1819: 1816: 1811: 1806: 1801: 1796: 1793: 1783: 1771: 1768: 1763: 1758: 1753: 1748: 1743: 1738: 1733: 1728: 1716: 1711: 1706: 1701: 1696: 1691: 1686: 1681: 1676: 1671: 1666: 1661: 1656: 1650: 1648: 1636: 1635: 1633: 1632: 1627: 1622: 1617: 1612: 1607: 1602: 1597: 1592: 1587: 1582: 1577: 1572: 1567: 1562: 1557: 1552: 1547: 1542: 1537: 1532: 1527: 1522: 1517: 1512: 1507: 1502: 1497: 1492: 1487: 1480: 1475: 1470: 1465: 1460: 1453: 1448: 1443: 1438: 1433: 1426: 1421: 1416: 1411: 1406: 1401: 1396: 1391: 1386: 1381: 1376: 1371: 1366: 1361: 1356: 1350: 1348: 1336: 1335: 1333: 1332: 1327: 1317: 1312: 1307: 1302: 1297: 1292: 1287: 1282: 1277: 1272: 1267: 1262: 1257: 1252: 1247: 1242: 1237: 1232: 1226: 1224: 1218: 1217: 1215: 1214: 1209: 1204: 1199: 1194: 1189: 1184: 1183: 1182: 1172: 1167: 1162: 1157: 1152: 1147: 1142: 1137: 1132: 1127: 1121: 1119: 1110: 1104: 1103: 1101: 1100: 1095: 1090: 1085: 1080: 1075: 1070: 1065: 1060: 1055: 1050: 1045: 1040: 1035: 1030: 1025: 1020: 1015: 1010: 1005: 1000: 995: 990: 985: 980: 975: 970: 965: 960: 955: 950: 945: 940: 935: 930: 925: 920: 915: 910: 905: 900: 895: 890: 885: 880: 875: 870: 865: 860: 855: 850: 845: 840: 835: 834: 833: 823: 818: 813: 807: 805: 801: 800: 797:IEEE standards 793: 792: 785: 778: 770: 764: 763: 746: 745:External links 743: 741: 740: 729: 716: 715: 714: 709: 708: 683: 663: 660:. p. 165. 646: 629: 610:IEEE Standards 592: 574:IEEE Standards 556: 534:IEEE Standards 516: 498:IEEE Standards 480: 460:IEEE Standards 443: 441: 438: 437: 436: 430: 422: 419: 414: 411: 408: 407: 404: 401: 398: 395: 392: 389: 386: 383: 380: 377: 374: 368: 367: 364: 361: 358: 355: 352: 349: 346: 343: 340: 337: 334: 322: 319: 317: 314: 306: 305: 302: 295: 294: 291: 283: 280: 270: 267: 266: 265: 262: 242: 239: 238: 237: 234: 231: 224: 214:-Key frames): 169: 166: 138:pre-shared key 113: 110: 89:, also called 83:Wi-Fi Alliance 70: 67: 15: 9: 6: 4: 3: 2: 2135: 2124: 2121: 2119: 2116: 2115: 2113: 2098: 2095: 2093: 2090: 2088: 2085: 2084: 2081: 2075: 2072: 2070: 2067: 2065: 2062: 2060: 2057: 2055: 2052: 2050: 2047: 2045: 2042: 2041: 2039: 2035: 2029: 2026: 2024: 2021: 2019: 2016: 2014: 2011: 2009: 2006: 2005: 2003: 1999: 1989: 1986: 1984: 1981: 1979: 1976: 1974: 1971: 1969: 1966: 1964: 1961: 1959: 1956: 1954: 1951: 1949: 1946: 1944: 1941: 1939: 1936: 1933: 1929: 1926: 1924: 1921: 1919: 1916: 1913: 1909: 1906: 1905: 1903: 1901: 1897: 1890: 1886: 1885: 1881: 1878: 1875: 1872: 1869: 1866: 1862: 1861: 1857: 1854: 1851: 1849: 1846: 1843: 1840: 1838: 1835: 1832: 1828: 1827: 1823: 1820: 1817: 1815: 1812: 1810: 1807: 1805: 1802: 1800: 1797: 1794: 1791: 1787: 1784: 1781: 1777: 1776: 1772: 1769: 1767: 1764: 1762: 1759: 1757: 1754: 1752: 1749: 1747: 1744: 1742: 1739: 1737: 1734: 1732: 1729: 1726: 1722: 1721: 1717: 1715: 1712: 1710: 1707: 1705: 1702: 1700: 1697: 1695: 1692: 1690: 1687: 1685: 1682: 1680: 1677: 1675: 1672: 1670: 1667: 1665: 1662: 1660: 1657: 1655: 1652: 1651: 1649: 1646: 1641: 1637: 1631: 1628: 1626: 1623: 1621: 1618: 1616: 1613: 1611: 1608: 1606: 1603: 1601: 1598: 1596: 1593: 1591: 1588: 1586: 1583: 1581: 1578: 1576: 1573: 1571: 1568: 1566: 1563: 1561: 1558: 1556: 1553: 1551: 1548: 1546: 1543: 1541: 1538: 1536: 1533: 1531: 1528: 1526: 1523: 1521: 1518: 1516: 1513: 1511: 1508: 1506: 1503: 1501: 1498: 1496: 1493: 1491: 1488: 1486: 1485: 1481: 1479: 1476: 1474: 1471: 1469: 1466: 1464: 1461: 1459: 1458: 1454: 1452: 1449: 1447: 1444: 1442: 1439: 1437: 1434: 1432: 1431: 1427: 1425: 1422: 1420: 1417: 1415: 1412: 1410: 1407: 1405: 1402: 1400: 1397: 1395: 1392: 1390: 1387: 1385: 1382: 1380: 1377: 1375: 1372: 1370: 1367: 1365: 1362: 1360: 1357: 1355: 1352: 1351: 1349: 1346: 1341: 1337: 1331: 1328: 1325: 1321: 1318: 1316: 1313: 1311: 1308: 1306: 1303: 1301: 1298: 1296: 1293: 1291: 1288: 1286: 1283: 1281: 1278: 1276: 1273: 1271: 1268: 1266: 1263: 1261: 1258: 1256: 1253: 1251: 1248: 1246: 1243: 1241: 1238: 1236: 1233: 1231: 1228: 1227: 1225: 1223: 1219: 1213: 1210: 1208: 1205: 1203: 1200: 1198: 1195: 1193: 1190: 1188: 1185: 1181: 1180:WiMAX · d · e 1178: 1177: 1176: 1173: 1171: 1168: 1166: 1163: 1161: 1158: 1156: 1153: 1151: 1148: 1146: 1143: 1141: 1138: 1136: 1133: 1131: 1128: 1126: 1123: 1122: 1120: 1118: 1114: 1111: 1109: 1105: 1099: 1096: 1094: 1091: 1089: 1086: 1084: 1081: 1079: 1076: 1074: 1071: 1069: 1066: 1064: 1061: 1059: 1056: 1054: 1051: 1049: 1046: 1044: 1041: 1039: 1036: 1034: 1031: 1029: 1026: 1024: 1021: 1019: 1016: 1014: 1011: 1009: 1006: 1004: 1001: 999: 996: 994: 991: 989: 986: 984: 981: 979: 976: 974: 971: 969: 966: 964: 961: 959: 956: 954: 951: 949: 946: 944: 941: 939: 936: 934: 931: 929: 926: 924: 921: 919: 916: 914: 911: 909: 906: 904: 901: 899: 896: 894: 891: 889: 886: 884: 881: 879: 876: 874: 871: 869: 866: 864: 861: 859: 856: 854: 851: 849: 846: 844: 841: 839: 836: 832: 829: 828: 827: 824: 822: 819: 817: 814: 812: 809: 808: 806: 802: 798: 791: 786: 784: 779: 777: 772: 771: 768: 762: 759: 755: 752: 749: 748: 734: 730: 727:. 2007-03-08. 726: 722: 718: 717: 712: 711: 698:on 2018-04-27 697: 693: 687: 676: 670: 668: 656: 650: 643:. p. 33. 639: 633: 627:(Broken Link) 615: 611: 604: 603: 596: 579: 575: 568: 567: 560: 553: 539: 535: 528: 527: 520: 503: 499: 492: 491: 484: 478:(Broken Link) 465: 461: 454: 448: 444: 434: 431: 428: 425: 424: 418: 405: 402: 399: 396: 393: 390: 387: 384: 381: 378: 375: 373: 370: 369: 365: 362: 359: 356: 353: 350: 347: 344: 341: 338: 335: 333: 330: 329: 313: 310: 303: 300: 299: 298: 292: 289: 288: 287: 282:Key hierarchy 279: 276: 269:CCMP overview 263: 260: 256: 255: 254: 252: 247: 235: 232: 229: 225: 221: 217: 216: 215: 213: 208: 206: 202: 198: 194: 190: 189:concatenating 186: 181: 177: 175: 165: 163: 159: 155: 151: 147: 143: 139: 134: 132: 128: 123: 120: 109: 107: 106:stream cipher 104: 100: 96: 92: 88: 84: 80: 76: 66: 64: 60: 56: 53: 49: 45: 41: 37: 33: 29: 25: 21: 2086: 1882: 1858: 1824: 1773: 1718: 1703: 1482: 1455: 1428: 700:. Retrieved 696:the original 686: 649: 632: 621:, retrieved 614:the original 601: 595: 585:, retrieved 578:the original 565: 559: 551: 545:, retrieved 538:the original 525: 519: 509:, retrieved 502:the original 489: 483: 471:. Retrieved 464:the original 447: 433:IEEE 802.1AE 416: 371: 331: 311: 307: 296: 285: 272: 250: 248: 244: 209: 182: 178: 171: 135: 124: 115: 99:block cipher 90: 86: 72: 47: 43: 23: 19: 18: 2123:IEEE 802.11 1659:legacy mode 197:MAC address 119:IEEE 802.1X 28:IEEE 802.11 2112:Categories 2037:Superseded 1108:802 series 702:2018-04-27 623:2010-04-09 587:2010-04-09 547:2010-04-09 511:2010-04-09 473:2007-12-21 440:References 360:More Data 156:that uses 65:standard. 55:deprecated 1912:Bluetooth 205:multicast 52:amendment 2087:See also 2044:754-1985 2001:Proposed 1345:Ethernet 831:Revision 754:Archived 421:See also 348:From DS 342:Subtype 332:Subfield 48:Security 36:security 2028:P1906.1 1889:Wi-Fi 8 1865:Wi-Fi 7 1831:Wi-Fi 6 1780:Wi-Fi 5 1725:Wi-Fi 4 804:Current 713:General 382:4 bits 379:2 bits 376:2 bits 366:Orders 160:as the 57:broken 24:802.11i 1932:Zigbee 1900:802.15 1640:802.11 878:1149.1 435:MACsec 406:1 bit 403:1 bit 400:1 bit 397:1 bit 394:1 bit 391:1 bit 388:1 bit 385:1 bit 354:Retry 345:To DS 97:(AES) 2023:P1823 2018:P1699 2013:P1619 2008:P1363 1790:WiGig 1654:-1997 1645:Wi-Fi 1354:-1983 1340:802.3 1222:802.1 1098:42010 1093:29148 1088:16326 1083:16085 1078:14764 1073:12207 1068:11073 736:(PDF) 678:(PDF) 658:(PDF) 641:(PDF) 617:(PDF) 606:(PDF) 581:(PDF) 570:(PDF) 541:(PDF) 530:(PDF) 505:(PDF) 494:(PDF) 467:(PDF) 456:(PDF) 339:Type 212:EAPOL 193:nonce 158:SHA-1 146:EAPOL 22:, or 2074:1471 2069:1364 2064:1362 2059:1233 2054:1219 1324:LACP 1063:2050 1058:2030 1053:1905 1048:1904 1043:1902 1038:1901 1033:1900 1028:1855 1023:1850 1018:1849 1013:1815 1008:1801 1003:1800 998:1733 993:1722 988:1685 983:1675 978:1667 973:1666 968:1619 963:1613 958:1603 953:1596 948:1588 943:1584 938:1547 933:1541 928:1516 923:1497 918:1451 913:1394 908:1355 903:1284 898:1278 893:1275 888:1164 883:1154 873:1076 868:1016 863:1014 858:1003 725:IEEE 372:Bits 223:PTK. 218:The 185:keys 131:CCMP 129:and 127:TKIP 87:WPA2 2049:830 1973:.4z 1968:.4g 1963:.4f 1958:.4e 1953:.4d 1948:.4c 1943:.4b 1938:.4a 1265:Qbb 1260:Qaz 1255:Qay 1250:Qat 1245:Qav 1212:.24 1207:.22 1202:.21 1197:.20 1192:.18 1187:.17 1175:.16 1170:.14 1165:.12 1160:.10 1117:802 853:896 848:829 843:828 838:854 826:754 821:730 816:693 811:488 259:MIC 142:EAP 103:RC4 91:RSN 2114:: 1988:.7 1983:.6 1978:.5 1928:.4 1923:.3 1918:.2 1908:.1 1884:bn 1879:bk 1876:bi 1873:bh 1870:bf 1860:be 1855:bd 1852:bc 1848:bb 1844:ba 1841:az 1837:ay 1826:ax 1821:aq 1818:ak 1814:aj 1809:ai 1804:ah 1799:af 1795:ae 1786:ad 1775:ac 1770:aa 1630:df 1625:de 1620:dd 1615:db 1610:da 1605:cz 1600:cy 1595:cx 1590:cw 1585:cv 1580:cu 1575:ct 1570:cs 1565:cr 1560:cq 1555:cp 1550:cn 1545:cm 1540:ck 1535:ch 1530:cg 1525:ce 1520:cd 1515:cc 1510:cb 1505:ca 1500:bz 1495:by 1490:bu 1484:bt 1478:ba 1473:az 1468:av 1463:au 1457:at 1451:aq 1446:an 1441:ak 1436:ah 1430:af 1424:ae 1419:ad 1414:ac 1409:ab 1330:BA 1320:AX 1315:AS 1310:aq 1305:ak 1300:ah 1295:ag 1290:AE 1285:ad 1280:AB 1155:.9 1150:.8 1145:.7 1140:.6 1135:.5 1130:.4 1125:.2 760:, 723:. 666:^ 608:, 572:, 550:, 532:, 496:, 458:. 220:AP 108:. 1934:) 1930:( 1914:) 1910:( 1891:) 1887:( 1867:) 1863:( 1833:) 1829:( 1792:) 1788:( 1782:) 1778:( 1766:z 1761:y 1756:w 1751:v 1746:u 1741:s 1736:r 1731:p 1727:) 1723:( 1720:n 1714:k 1709:j 1704:i 1699:h 1694:g 1689:f 1684:e 1679:d 1674:c 1669:b 1664:a 1647:) 1643:( 1404:z 1399:y 1394:x 1389:u 1384:j 1379:i 1374:e 1369:d 1364:b 1359:a 1347:) 1343:( 1326:) 1322:( 1275:X 1270:w 1240:Q 1235:p 1230:D 789:e 782:t 775:v 705:. 680:. 476:. 261:.

Index

IEEE 802.11
Wi-Fi Protected Access II
security
wireless networks
amendment
deprecated
Wired Equivalent Privacy
IEEE 802.11-2007
Wired Equivalent Privacy
Wi-Fi Protected Access
Wi-Fi Alliance
Advanced Encryption Standard
block cipher
RC4
stream cipher
IEEE 802.1X
TKIP
CCMP
pre-shared key
EAP
EAPOL
Pairwise Master Key
key derivation function
SHA-1
cryptographic hash function
thumb in 802.11i
keys
concatenating
nonce
MAC address

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑