- Wireless networks are inherently insecure because radio signals can be intercepted by anyone within range
- Encryption protects data in transit by scrambling it so only authorized devices with the correct key can decrypt it
- All wireless networks should use encryption - open networks expose all traffic to eavesdropping
- Modern wireless encryption operates at Layer 2 (Data Link) and encrypts frames between client and access point
Evolution of Wireless Security Standards
- WEP (Wired Equivalent Privacy) - Original 802.11 security, now completely broken
- WPA (Wi-Fi Protected Access) - Interim solution to replace WEP, uses TKIP encryption
- WPA2 - Current standard using AES encryption, mandatory for Wi-Fi certification since 2006
- WPA3 - Latest standard (2018) with enhanced security features and forward secrecy
| Protocol | Encryption | Key Length | Authentication | Status |
|---|---|---|---|---|
| WEP | RC4 | 64/128-bit | Pre-shared key | Broken - avoid |
| WPA | TKIP/RC4 | 128-bit | PSK or 802.1X | Deprecated |
| WPA2 | AES-CCMP | 128-bit | PSK or 802.1X | Current standard |
| WPA3 | AES-GCMP | 128/192-bit | SAE or 802.1X | Latest standard |
WEP (Wired Equivalent Privacy)
- Uses RC4 stream cipher with static keys that never change
- Fundamentally flawed - can be cracked in minutes with freely available tools
- Initialization Vector (IV) is only 24 bits, causing frequent reuse and predictable patterns
- No message integrity checking, allowing packet injection attacks
- For example, a busy network generates enough traffic to crack WEP in under 5 minutes
WPA/WPA2 Personal (Pre-Shared Key)
- Uses a passphrase (8-63 characters) that’s converted into a 256-bit Pre-Shared Key (PSK)
- PSK is combined with network SSID using PBKDF2 function to create unique encryption keys
- WPA uses TKIP (Temporal Key Integrity Protocol) - still uses RC4 but with rotating keys
- WPA2 uses AES-CCMP (Counter Mode with CBC-MAC Protocol) - much stronger encryption
- Each client gets unique encryption keys derived from the PSK (prevents client-to-client decryption)
WPA/WPA2 Enterprise (802.1X)
- Uses RADIUS server for centralized authentication instead of shared passphrase
- Each user has individual credentials (username/password or certificates)
- EAP (Extensible Authentication Protocol) handles the authentication process
- Common EAP methods: EAP-TLS (certificates), PEAP-MSCHAPv2 (username/password)
- Provides per-user and per-session encryption keys for maximum security
- Used for corporate networks where individual user accountability is required
WPA3 Enhancements
- SAE (Simultaneous Authentication of Equals) replaces PSK authentication
- Provides forward secrecy - past traffic can’t be decrypted even if password is compromised
- Protects against offline dictionary attacks on captured handshakes
- WPA3-Personal: Enhanced Open for public networks, stronger password-based authentication
- WPA3-Enterprise: 192-bit security suite for high-security environments
Key Management and Four-Way Handshake
- WPA/WPA2 uses four-way handshake to establish encryption keys without transmitting them
- Process derives session keys from master key without revealing the master key
- PTK (Pairwise Transient Key) - unique encryption key for each client
- GTK (Group Temporal Key) - shared key for broadcast/multicast traffic
- Handshake also provides mutual authentication between client and access point
Vocabulary
TKIP - Temporal Key Integrity Protocol; WPA encryption that adds key rotation to RC4
CCMP - Counter Mode with CBC-MAC Protocol; WPA2’s AES-based encryption method
PSK - Pre-Shared Key; 256-bit key derived from WPA/WPA2 passphrase
SAE - Simultaneous Authentication of Equals; WPA3’s password-based authentication
Forward Secrecy - Property where compromising current keys doesn’t expose past communications
PBKDF2 - Password-Based Key Derivation Function; converts passphrase into encryption key
Notes
- Never use WEP - it provides no real security and gives false sense of protection
- WPA2-Personal is adequate for home/small business if using strong passphrase (20+ characters)
- WPA2-Enterprise is recommended for corporate environments requiring user accountability
- When configuring WPA2, ensure all devices support AES - mixed TKIP/AES modes are weaker
- WPA3 is still being adopted - ensure client device compatibility before deployment
- For guest networks, consider WPA3 Enhanced Open or captive portal with WPA2
- Regular passphrase changes aren’t necessary with WPA2/WPA3 unless compromise is suspected
- Monitor for deauthentication attacks which can force clients to reconnect and expose handshakes