Is WPA is still secure? Or maybe
you need to use WPA2?
Nzavatunga J.Luwawa
Topics
• WPA definition
• WPA encryption and authentication
• 802.1x
• WPA integrity and confidence
• WPA vulnerabilities
• WPA2
• Comparison between WPA and WPA2
• Summary
• Reference
WPA (Wi-Fi Protected Access)
• Developed by the Wi-Fi Alliance to secure
wireless computer networks
• It was adopted in 2003 to solve weakness in WEP
• Standardized in IEEE 802.11i
• Increased in safety: encryption 256 bits
• Known as TKIP(Temporal key Integrity)
• It uses RC4 encryption to secure the data
• It uses the MIC and frame counter to verify the
integrity of the data.
WPA Encryption and authentication
• WPA introduced new authentication protocol,
improved integrity protection measure and per-
packets
- To provide stronger authentication than in WEP
- To prevent spoofing attacks(i.e. bit flopping on
WEP CRC)
- To prevent FM-style attacks.
WPA Encryption and authentication
WPA Encryption and authentication methods are:
• WPA personal(PSK)
• WPA enterprise(802.1x +Radio)
WPA Personal
• Designed for SOHO-small
office/Home office
• Uses PSK(Pre-shared
Key)passphrase shared
between AP and the user
• Authentication is made by the
AP
• Key is manually configured in
each equipment in network
• Key varies from 8 to 63
characters ASCII
WPA Enterprise
• Designed to authenticate individual users
to an external server via username and
password.
• Infrastructure is formed by a protocol
which uses a 802.1X server in conjunction
with EAP(Extensible Authentication
Protocol)
802.1x
• Communication protocol used between the AP
and the authentication server
• When a client requests authentication, the
authentication server checks in its database if
the credentials presented by the petitioner are
valid, and if so the client is authenticated and a
key called Master Session Key (MSK) is sent to
you.
• Most often, it is used as the authentication
server a RADIUS server
802.1x Phase
• 1. Mutually authenticate
STA and AS
• 2. Generate Master Key
(MK) as a side effect of
authentication
• 3. Generate pairwise MK
as an access authorization
token
• 4. Generate 4 keys for
encryption/integrity
802.1x Authentication phase
EAP(Extensible Authentication Protocol)
Is responsible for creating a logical channel secure
communication between the client (supplicant) and the
authentication server, where the credentials will travel on.
• Physically, the client communicates with the
AP through EAPoL protocol (Extensible Authentication
Protocol over LAN).
• AP communicates with the authentication server
through 802.1x protocol
EAP
WPA enterprise
EAP standards
WPA Integrity
WPA Integrity consists of two values:
• ICV(Integrity Check Value)
• MIC
ICV (Integrity check value)
• The ICV is a typical CRC added to the
original message before encryption be
performed
• a client (or AP) decodes and calculates the
the CRC-32 of the message, providing it with
the CRC-32 informed the ICV field. If they
are different, the message is discarded.
ICV
MIC(Message Integrity Code)
• New verification code message
• Used to check whether the contents of a data
frame has changes for errors transmitting or
manipulating data
• Uses 64 bits while WEP
• The MIC is obtained through an algorithm known
as Michael.
Integrity
• So integrity is represented by a total of 12 bytes
8 generated by Michael and 4 CRC-32
WAP confidence/ TKIP
• TKIP (Temporal Key Integrity Protocol)
• Designed to solve WEP weakness
• Initialization vector has 48 bits
• TKIP uses existing RC4 but avoids some of the
worst WEP’s problems.
• Almost impossible to have reutilization of
vector
• TKIP is based on the concept of temporal keys, or the
key is used for while and then dynamically replaced.
TKIP
TKIP corrects the following previous WAP flaws:
• IV (Initialization Vector) selection and use: as
counter (sequence number)
• Per-packet key mixing
• Increase the size of IV.
• Key management.
WPA vulnerabilities
• Weakness in the key
combination
algorithm
• PSK is vulnerable to
eavesdropping and
dictionary attack.
• TKIP vulnerability
allows attacker to
guess IP address of
the subnet.
WPA2
• Has replaced WPA
• Was adopted in 2004
• From March 13, 2006, WPA2 certification is
mandatory for all new devices to bear the Wi-Fi
trademark
• it introduces CCMP, a new AES-based encryption
mode with strong security
• Enhanced the integrity
WPA2 Authentication
• WPA2 separates the user authentication from the
message integrity and privacy, which makes it
provide more flexibility
• The authentication in the WPA2 Personal mode
doesn’t require having an authentication server.
• WPA2 Enterprise mode consists of the following
components :
WPA2 Encryption
• WPA2 uses AES with a key length of 128 bit to
encrypt data.
• The AES uses Counter-Mode/CBC-MAC Protocol
(CCMP)
• The CCMP uses the same key for both encryption
and authentication, but different initialization
vector.
WPA2 Pros
The WPA2 has immunity against many types of
hacker attack like:
• Man-in-the-middle.
• Authentication forging.
• Replay.
• Key collision.
• Weak keys.
• Packet forging.
• Brute force/dictionary attacks.
WPA2 cons
• Can’t protect agains layer 2 session hijack
• RF Jamming
• Data flooding
• Access points failure
802.11 security solutions
Summary
1.WPA2 is the improved version of WPA
2.WPA only supports TKIP encryption while
WPA2 supports AES
3.Theoretically, WPA2 is not hackable
while WPA is
4.WPA2 requires more processing power
than WPA
Questions
1. what is WPA?
2. What are the difference between WPA
and WPA2?
3. What is WPA Personal?
4. How many bit AES Encryption contains?
References
• [1] - Shafi, M et al, 1997. Wireless communications in the twenty-first
century: a perspective.
• Proceedings of the IEEE. Vol 85, No 10, pp 1622 – 1638.
• [2] - IEEE 802.11 WG, 1999. Part11: Wireless LAN Medium Access Control
(MAC) and Physical Layer
• Specification. IEEE Computer Society.
• [3] - Borsc, M.e Shinde, H., 2005. Wireless security & privacy. Personal
Wireless Communications,
• 2005. ICPWC 2005. 2005 IEEE International Conference on. pp 424 – 428.
• [4] - Boland, H.e Mousavi, H., 2004. Security issues of the IEEE 802.11b
wireless LAN. Electrical and
• Computer Engineering, 2004. Canadian Conference on. Vol 1, pp 333 – 336.
• [5] - Fluhrer, S., Mantin, I. e Shamir, A., 2001. Weaknesses in the key
scheduling algorithm of RC4.
• Eighth Annual Workshop on Selected Areas in Cryptography. Toronto,
Canada.

More Related Content

PPTX
PPTX
WPA 3
PPTX
802.1x
PPTX
Wireless Network Security
PPTX
Wifi Security
PPTX
Chapter 7 - Wireless Network Security.pptx
PPTX
WEP/WPA attacks
WPA 3
802.1x
Wireless Network Security
Wifi Security
Chapter 7 - Wireless Network Security.pptx
WEP/WPA attacks

What's hot (20)

PPTX
WPA-3: SEA and Dragonfly
PDF
KRACK attack
PPTX
Wireless network security
PPSX
Wireless Network Security
PPTX
WEP .WAP WAP2.pptx
PPTX
WLAN Attacks and Protection
PPTX
Wi Fi Security
PPTX
CCNA ppt Day 1
PPT
Wireless security presentation
PPTX
Wireless security using wpa2
PPT
PPTX
IPSec and VPN
PPTX
Internet Key Exchange Protocol
PPT
Virtual private network
PPT
Implementing 802.1x Authentication
PPTX
Wireless Network security
PPTX
WPA3 - What is it good for?
PPTX
SSL And TLS
PPTX
Network security
PPTX
ASYNCHRONOUS TRANSFER MODE (ATM)
WPA-3: SEA and Dragonfly
KRACK attack
Wireless network security
Wireless Network Security
WEP .WAP WAP2.pptx
WLAN Attacks and Protection
Wi Fi Security
CCNA ppt Day 1
Wireless security presentation
Wireless security using wpa2
IPSec and VPN
Internet Key Exchange Protocol
Virtual private network
Implementing 802.1x Authentication
Wireless Network security
WPA3 - What is it good for?
SSL And TLS
Network security
ASYNCHRONOUS TRANSFER MODE (ATM)
Ad

Similar to Wpa vs Wpa2 (20)

PPT
Wi fi protected-access
PPS
Iuwne10 S04 L05
PPTX
Wpa2 psk security measure
PPT
Wireless security837
PPT
Ch06 Wireless Network Security
PDF
DTS Solution - Wireless Security Protocols / PenTesting
PDF
Describe the primary differences between WEP, WPA, and WPA2 protocol.pdf
PPTX
Wi fi security
PPTX
Wireless security
PPT
Wi fi protected access
PPTX
WLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmm
PPTX
WLAN SECURITY BY SAIKIRAN PANJALA
PPS
Workshop on Wireless Security
PPS
Sheetal - Wirelesss Hacking - ClubHack2008
PPTX
CCNA 200-301 Chapter 28 Securing Wireless Networks.pptx
PDF
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
PPTX
Security standard
PPT
Wireless and WLAN Secuirty, Presented by Vijay
PDF
802 11 3
PPT
WLAN SECURITY ..........................outline
Wi fi protected-access
Iuwne10 S04 L05
Wpa2 psk security measure
Wireless security837
Ch06 Wireless Network Security
DTS Solution - Wireless Security Protocols / PenTesting
Describe the primary differences between WEP, WPA, and WPA2 protocol.pdf
Wi fi security
Wireless security
Wi fi protected access
WLAN Security-2new.pptxmmmmmmmmmmmmmmmmmmmmmmmmmmm
WLAN SECURITY BY SAIKIRAN PANJALA
Workshop on Wireless Security
Sheetal - Wirelesss Hacking - ClubHack2008
CCNA 200-301 Chapter 28 Securing Wireless Networks.pptx
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Security standard
Wireless and WLAN Secuirty, Presented by Vijay
802 11 3
WLAN SECURITY ..........................outline
Ad

Recently uploaded (20)

PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
PPTX
Microsoft User Copilot Training Slide Deck
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
SaaS reusability assessment using machine learning techniques
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PPTX
Configure Apache Mutual Authentication
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
Microsoft User Copilot Training Slide Deck
giants, standing on the shoulders of - by Daniel Stenberg
future_of_ai_comprehensive_20250822032121.pptx
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Improvisation in detection of pomegranate leaf disease using transfer learni...
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
SaaS reusability assessment using machine learning techniques
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Custom Battery Pack Design Considerations for Performance and Safety
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Configure Apache Mutual Authentication
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Early detection and classification of bone marrow changes in lumbar vertebrae...
Rapid Prototyping: A lecture on prototyping techniques for interface design
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf

Wpa vs Wpa2

  • 1. Is WPA is still secure? Or maybe you need to use WPA2? Nzavatunga J.Luwawa
  • 2. Topics • WPA definition • WPA encryption and authentication • 802.1x • WPA integrity and confidence • WPA vulnerabilities • WPA2 • Comparison between WPA and WPA2 • Summary • Reference
  • 3. WPA (Wi-Fi Protected Access) • Developed by the Wi-Fi Alliance to secure wireless computer networks • It was adopted in 2003 to solve weakness in WEP • Standardized in IEEE 802.11i • Increased in safety: encryption 256 bits • Known as TKIP(Temporal key Integrity) • It uses RC4 encryption to secure the data • It uses the MIC and frame counter to verify the integrity of the data.
  • 4. WPA Encryption and authentication • WPA introduced new authentication protocol, improved integrity protection measure and per- packets - To provide stronger authentication than in WEP - To prevent spoofing attacks(i.e. bit flopping on WEP CRC) - To prevent FM-style attacks.
  • 5. WPA Encryption and authentication WPA Encryption and authentication methods are: • WPA personal(PSK) • WPA enterprise(802.1x +Radio)
  • 6. WPA Personal • Designed for SOHO-small office/Home office • Uses PSK(Pre-shared Key)passphrase shared between AP and the user • Authentication is made by the AP • Key is manually configured in each equipment in network • Key varies from 8 to 63 characters ASCII
  • 7. WPA Enterprise • Designed to authenticate individual users to an external server via username and password. • Infrastructure is formed by a protocol which uses a 802.1X server in conjunction with EAP(Extensible Authentication Protocol)
  • 8. 802.1x • Communication protocol used between the AP and the authentication server • When a client requests authentication, the authentication server checks in its database if the credentials presented by the petitioner are valid, and if so the client is authenticated and a key called Master Session Key (MSK) is sent to you. • Most often, it is used as the authentication server a RADIUS server
  • 9. 802.1x Phase • 1. Mutually authenticate STA and AS • 2. Generate Master Key (MK) as a side effect of authentication • 3. Generate pairwise MK as an access authorization token • 4. Generate 4 keys for encryption/integrity
  • 11. EAP(Extensible Authentication Protocol) Is responsible for creating a logical channel secure communication between the client (supplicant) and the authentication server, where the credentials will travel on. • Physically, the client communicates with the AP through EAPoL protocol (Extensible Authentication Protocol over LAN). • AP communicates with the authentication server through 802.1x protocol
  • 14. WPA Integrity WPA Integrity consists of two values: • ICV(Integrity Check Value) • MIC
  • 15. ICV (Integrity check value) • The ICV is a typical CRC added to the original message before encryption be performed • a client (or AP) decodes and calculates the the CRC-32 of the message, providing it with the CRC-32 informed the ICV field. If they are different, the message is discarded.
  • 16. ICV
  • 17. MIC(Message Integrity Code) • New verification code message • Used to check whether the contents of a data frame has changes for errors transmitting or manipulating data • Uses 64 bits while WEP • The MIC is obtained through an algorithm known as Michael.
  • 18. Integrity • So integrity is represented by a total of 12 bytes 8 generated by Michael and 4 CRC-32
  • 19. WAP confidence/ TKIP • TKIP (Temporal Key Integrity Protocol) • Designed to solve WEP weakness • Initialization vector has 48 bits • TKIP uses existing RC4 but avoids some of the worst WEP’s problems. • Almost impossible to have reutilization of vector • TKIP is based on the concept of temporal keys, or the key is used for while and then dynamically replaced.
  • 20. TKIP TKIP corrects the following previous WAP flaws: • IV (Initialization Vector) selection and use: as counter (sequence number) • Per-packet key mixing • Increase the size of IV. • Key management.
  • 21. WPA vulnerabilities • Weakness in the key combination algorithm • PSK is vulnerable to eavesdropping and dictionary attack. • TKIP vulnerability allows attacker to guess IP address of the subnet.
  • 22. WPA2 • Has replaced WPA • Was adopted in 2004 • From March 13, 2006, WPA2 certification is mandatory for all new devices to bear the Wi-Fi trademark • it introduces CCMP, a new AES-based encryption mode with strong security • Enhanced the integrity
  • 23. WPA2 Authentication • WPA2 separates the user authentication from the message integrity and privacy, which makes it provide more flexibility • The authentication in the WPA2 Personal mode doesn’t require having an authentication server. • WPA2 Enterprise mode consists of the following components :
  • 24. WPA2 Encryption • WPA2 uses AES with a key length of 128 bit to encrypt data. • The AES uses Counter-Mode/CBC-MAC Protocol (CCMP) • The CCMP uses the same key for both encryption and authentication, but different initialization vector.
  • 25. WPA2 Pros The WPA2 has immunity against many types of hacker attack like: • Man-in-the-middle. • Authentication forging. • Replay. • Key collision. • Weak keys. • Packet forging. • Brute force/dictionary attacks.
  • 26. WPA2 cons • Can’t protect agains layer 2 session hijack • RF Jamming • Data flooding • Access points failure
  • 28. Summary 1.WPA2 is the improved version of WPA 2.WPA only supports TKIP encryption while WPA2 supports AES 3.Theoretically, WPA2 is not hackable while WPA is 4.WPA2 requires more processing power than WPA
  • 29. Questions 1. what is WPA? 2. What are the difference between WPA and WPA2? 3. What is WPA Personal? 4. How many bit AES Encryption contains?
  • 30. References • [1] - Shafi, M et al, 1997. Wireless communications in the twenty-first century: a perspective. • Proceedings of the IEEE. Vol 85, No 10, pp 1622 – 1638. • [2] - IEEE 802.11 WG, 1999. Part11: Wireless LAN Medium Access Control (MAC) and Physical Layer • Specification. IEEE Computer Society. • [3] - Borsc, M.e Shinde, H., 2005. Wireless security & privacy. Personal Wireless Communications, • 2005. ICPWC 2005. 2005 IEEE International Conference on. pp 424 – 428. • [4] - Boland, H.e Mousavi, H., 2004. Security issues of the IEEE 802.11b wireless LAN. Electrical and • Computer Engineering, 2004. Canadian Conference on. Vol 1, pp 333 – 336. • [5] - Fluhrer, S., Mantin, I. e Shamir, A., 2001. Weaknesses in the key scheduling algorithm of RC4. • Eighth Annual Workshop on Selected Areas in Cryptography. Toronto, Canada.