WPA3
1) Basic security enhancements in WPA3 vs. WPA2
WPA2 flaws - susceptible to brute force and offline dictionary attacks where passwords can be recovered
offline dictionary attack: 4 way hand shake can be captured and passwords can be recovered.
The attacker can capture the 4 way handshake.
Make a guess of password from a dictionary list
Run the password through know function/algorithm(PBKDF2) that is defined in the standard to get the PMK/PSK .
From the captured message compute the PTK using
Anonce, Snonce, Cl Mac addr and AP Mac Address are known from the 4 way handshake
Computed PMK from guessed passphrase
Compute MIC
If the MIC matches with that in the captured message, PTK keys is correct ad password is cracked.
2) Security enhancements of encryption and integrity in WPA3
OWE : opportunistic wireless encryption ensures the data exchanged between client and AP is protected . Other clients can sniff the packets , but they cannot decrypt the packets Open Networks, ie unencrypted networks are replaced by OWE
Steps
1) Open authentication
2) Unauthenticated Diffee hellman at association time, when public keys are exchanged during the association request/ association response
3) Derive PMK , using the private key and other party's public key
PMK cannot be hacked
4) After association 4-way handshake to derive the encryption keys
Client connect to open SSID. This is an encryption only scheme no authentication , clients do not know they are connected to this AP and vice versa
3) Simultaneous Authentication of Equals (SAE) in WPA3 as an enhancement for legacy pre-shared key technology
wpa2-psk, which allows people to recover passwords is replaced by SAE
In SAE, user has to prove knowledge without revealing the password.
password based authentication based on dragon fly
key exchange based on zero knowledge proof key exchange
resistant to dictionary attacks
steps
1) uses 802.11 authentication frames. Authentication generates PMK
2) Usual Association
3) 4-way handshake
User experience/ work flow is the same as wpa2=psk where user enters the password.
4) purpose of Opportunistic Wireless Encryption (OWE) for public and guest networks
Use Cases
coffee shops use wpa2-psk
Banks and schools use wpa2-psk
In these use cases , where wpa2-psk is used, password can be hacked and encryptio keys can be found. So, OWE is used.
Comments
Post a Comment