WPA3

 

1) Basic security enhancements in WPA3 vs. WPA2

WPA2 flaws - susceptible to brute force and offline dictionary attacks where passwords can be recovered

offline dictionary attack: 4 way hand shake can be captured and passwords can be recovered.

The attacker can capture the 4 way handshake.

Make a guess of password from a dictionary list

Run  the password through know function/algorithm(PBKDF2) that is defined in the standard to get the PMK/PSK . 

From the captured message compute the PTK using

        Anonce, Snonce, Cl Mac addr and AP Mac Address are known from the 4 way            handshake

        Computed PMK from guessed passphrase

        Compute MIC

If the MIC matches with that in the captured message, PTK keys is correct ad password is cracked.


In WPA3, even if password can be guessed, the PMK cannot be hacked because of the way the key is derived.( dragon fly protocol)

 2) Security enhancements of encryption and integrity in WPA3

OWE : opportunistic wireless encryption ensures the data exchanged between client and AP is protected . Other clients can sniff the packets , but they cannot decrypt the packets Open Networks, ie unencrypted networks are replaced by OWE

Steps

1) Open authentication

2) Unauthenticated Diffee hellman at association time, when public keys are exchanged during the association request/ association response

3) Derive PMK , using the private key and other party's public key

        PMK cannot be hacked

4) After association 4-way handshake to derive the encryption keys

Client connect to open SSID. This is an encryption only scheme no authentication , clients do not know they are connected to this AP and vice versa


3) Simultaneous Authentication of Equals (SAE) in WPA3 as an enhancement for legacy pre-shared key technology

wpa2-psk, which allows people to recover passwords is replaced by SAE

In SAE, user has to prove knowledge without revealing the password.

password based authentication based on dragon fly key exchange based on zero knowledge  proof key exchange

resistant to dictionary attacks

steps

1) uses 802.11 authentication frames. Authentication generates PMK

2) Usual Association

3) 4-way handshake

User experience/ work flow is the same as wpa2=psk where user enters the password.

4) purpose of Opportunistic Wireless Encryption (OWE) for public and guest networks

Use Cases

coffee shops use wpa2-psk

Banks and schools use wpa2-psk

In these use cases , where wpa2-psk is used, password can be hacked and encryptio keys can be found. So, OWE is used.

Comments

Popular posts from this blog

Protection Mechansims in 802.11g

Protection Mechanism in 802.11n

Basics of FDM and OFDM