IEEE 802.11i-2004

IEEE 802.11i-2004, or 802.11i for short, is an amendment to the original IEEE 802.11, implemented as Wi-Fi Protected Access II (WPA2). The draft standard was ratified on 24 June 2004. This standard specifies security mechanisms for wireless networks, replacing the short Authentication and privacy clause of the original standard with a detailed Security clause. In the process, the amendment deprecated broken Wired Equivalent Privacy (WEP), while it was later incorporated into the published IEEE 802.11-2007 standard.

Replacement of WEP

802.11i supersedes the previous security specification, Wired Equivalent Privacy (WEP), which was shown to have security vulnerabilities. Wi-Fi Protected Access (WPA) had previously been introduced by the Wi-Fi Alliance as an intermediate solution to WEP insecurities. WPA implemented a subset of a draft of 802.11i. The Wi-Fi Alliance refers to their approved, interoperable implementation of the full 802.11i as WPA2, also called RSN (Robust Security Network). 802.11i makes use of the Advanced Encryption Standard (AES) block cipher, whereas WEP and WPA use the RC4 stream cipher.[1]

Protocol operation

IEEE 802.11i enhances IEEE 802.11-1999 by providing a Robust Security Network (RSN) with two new protocols: the four-way handshake and the group key handshake. These utilize the authentication services and port access control described in IEEE 802.1X to establish and change the appropriate cryptographic keys.[2][3] The RSN is a security network that only allows the creation of robust security network associations (RSNAs), which are a type of association used by a pair of stations (STAs) if the procedure to establish authentication or association between them includes the 4-Way Handshake.[4]

The standard also provides two RSNA data confidentiality and integrity protocols, TKIP and CCMP, with implementation of CCMP being mandatory since the confidentiality and integrity mechanisms of TKIP are not as robust as those of CCMP.[5] The main purpose to implement TKIP was that the algorithm should be implementable within the capabilities of most of the old devices supporting only WEP.

The initial authentication process is carried out either using a pre-shared key (PSK), or following an EAP exchange through 802.1X (known as EAPOL, which requires the presence of an authentication server). This process ensures that the client station (STA) is authenticated with the access point (AP). After the PSK or 802.1X authentication, a shared secret key is generated, called the Pairwise Master Key (PMK). In PSK authentication, the PMK is actually the PSK,[6] which is typically derived from the WiFi password by putting it through a key derivation function that uses SHA-1 as the cryptographic hash function.[7] If an 802.1X EAP exchange was carried out, the PMK is derived from the EAP parameters provided by the authentication server.

Four-way handshake

thumb in 802.11i

The four-way handshake[8] is designed so that the access point (or authenticator) and wireless client (or supplicant) can independently prove to each other that they know the PSK/PMK, without ever disclosing the key. Instead of disclosing the key, the access point (AP) and client encrypt messages to each other—that can only be decrypted by using the PMK that they already share—and if decryption of the messages was successful, this proves knowledge of the PMK. The four-way handshake is critical for protection of the PMK from malicious access points—for example, an attacker's SSID impersonating a real access point—so that the client never has to tell the access point its PMK.

The PMK is designed to last the entire session and should be exposed as little as possible; therefore, keys to encrypt the traffic need to be derived. A four-way handshake is used to establish another key called the Pairwise Transient Key (PTK). The PTK is generated by concatenating the following attributes: PMK, AP nonce (ANonce), STA nonce (SNonce), AP MAC address, and STA MAC address. The product is then put through a pseudo-random function. The handshake also yields the GTK (Group Temporal Key), used to decrypt multicast and broadcast traffic.

The actual messages exchanged during the handshake are depicted in the figure and explained below (all messages are sent as EAPOL-Key frames):

  1. The AP sends a nonce-value (ANonce) to the STA together with a Key Replay Counter, which is a number that is used to match each pair of messages sent, and discard replayed messages. The STA now has all the attributes to construct the PTK.
  2. The STA sends its own nonce-value (SNonce) to the AP together with a Message Integrity Code (MIC), including authentication, which is really a Message Authentication and Integrity Code (MAIC), and the Key Replay Counter which will be the same as Message 1, to allow AP to match the right Message 1.
  3. The AP verifies Message 2, by checking MIC, RSN, ANonce and Key Replay Counter Field, and if valid constructs and sends the GTK with another MIC.
  4. The STA verifies Message 3, by checking MIC and Key Replay Counter Field, and if valid sends a confirmation to the AP.

Group key handshake

The Group Temporal Key (GTK) used in the network may need to be updated due to the expiration of a preset timer. When a device leaves the network, the GTK also needs to be updated. This is to prevent the device from receiving any more multicast or broadcast messages from the AP.

To handle the updating, 802.11i defines a Group Key Handshake that consists of a two-way handshake:

  1. The AP sends the new GTK to each STA in the network. The GTK is encrypted using the KEK assigned to that STA, and protects the data from tampering, by use of a MIC.
  2. The STA acknowledges the new GTK and replies to the AP.

CCMP overview

CCMP is based on the Counter with CBC-MAC (CCM) mode of the AES encryption algorithm. CCM combines CTR for confidentiality and CBC-MAC for authentication and integrity. CCM protects the integrity of both the MPDU Data field and selected portions of the IEEE 802.11 MPDU header.

Key hierarchy

RSNA defines two key hierarchies:

  1. Pairwise key hierarchy, to protect unicast traffic
  2. GTK, a hierarchy consisting of a single key to protect multicast and broadcast traffic

The description of the key hierarchies uses the following two functions:

  • L(Str, F, L) - From Str starting from the left, extract bits F through F+L–1.
  • PRF-n - Pseudo-random function producing n bits of output, there are the 128, 192, 256, 384 and 512 versions, each of these output these number of bits.

The pairwise key hierarchy utilizes PRF-384 or PRF-512 to derive session-specific keys from a PMK, generating a PTK, which gets partitioned into a KCK and a KEK plus all the temporal keys used by the MAC to protect unicast communication.

The GTK shall be a random number which also gets generated by using PRF-n, usually PRF-128 or PRF-256, in this model, the group key hierarchy takes a GMK (Group Master Key) and generates a GTK.

MAC frame formats

Frame Control field

Frame Control field[9]
Subfield Protocol Version Type Subtype To DS From DS More Fragments Retry Power Management More Data Protected Frame Orders
Bits 2 bits 2 bits 4 bits 1 bit 1 bit 1 bit 1 bit 1 bit 1 bit 1 bit 1 bit

Protected Frame field

"The Protected Frame field is 1 bit in length. The Protected Frame field is set to 1 if the Frame Body field contains information that has been processed by a cryptographic encapsulation algorithm. The Protected Frame field is set to 1 only within data frames of type Data and within management frames of type Management, subtype Authentication. The Protected Frame field is set to 0 in all other frames. When the bit Protected Frame field is set to 1 in a data frame, the Frame Body field is protected utilizing the cryptographic encapsulation algorithm and expanded as defined in Clause 8. Only WEP is allowed as the cryptographic encapsulation algorithm for management frames of subtype Authentication."[8]

See also

References

  1. ^ "IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements" (PDF). IEEE Standards. 2004-07-23. Archived from the original (PDF) on May 17, 2005. Retrieved 2007-12-21. (Broken Link)
  2. ^ IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements (PDF), IEEE Standards, 2004-07-23, p. 14, archived from the original (PDF) on May 17, 2005, retrieved 2010-04-09
  3. ^ IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements (PDF), IEEE Standards, 2004-07-23, p. 14, archived from the original (PDF) on May 17, 2005, retrieved 2010-04-09, RSNA relies on IEEE 802.1X to provide authentication services and uses the IEEE 802.11 key management scheme
  4. ^ IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements (PDF), IEEE Standards, 2004-07-23, p. 5, archived from the original (PDF) on May 17, 2005, retrieved 2010-04-09
  5. ^ IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements (PDF), IEEE Standards, 2004-07-23, p. 43, archived from the original (PDF) on May 17, 2005, retrieved 2010-04-09 (Broken Link)
  6. ^ "IEEE 802.11i-2004 Standard Amendment 6: Medium Access Control (MAC) Security Enhancements" (PDF). p. 33.
  7. ^ "IEEE 802.11i-2004 Standard Amendment 6: Medium Access Control (MAC) Security Enhancements" (PDF). p. 165.
  8. ^ a b "IEEE 802.11i-2004 Standard Amendment 6: Medium Access Control (MAC) Security Enhancements" (PDF).
  9. ^ "Section of MAC frame formats". Archived from the original on 2018-04-27. Retrieved 2018-04-27.
General

Read other articles:

Artikel ini sebatang kara, artinya tidak ada artikel lain yang memiliki pranala balik ke halaman ini.Bantulah menambah pranala ke artikel ini dari artikel yang berhubungan atau coba peralatan pencari pranala.Tag ini diberikan pada Desember 2022. Krisztián Adorján Adorján playing bermain untuk Liverpool U-21 pada tahun 2012Informasi pribadiNama lengkap Krisztián Adorján Gábor[1]Tanggal lahir 19 Januari 1993 (umur 31)[1]Tempat lahir Budapest, HungariaTinggi 1,84 ...

 

AjegroupJenisSwastaIndustriBeverageDidirikan1988; 36 tahun lalu (1988)PendiriAñaños-Jerí FamilyKantorpusatLima, Peru[1]Wilayah operasiGlobalTokohkunciAngel Añaños (Ketua dan CEO) Carlos Añaños (Presiden)ProdukPurified water, fruit juices, carbonated drinks, energy drinks, ready-to-drink teas, grocery foods and alcoholic drinksKaryawan10,000Situs webwww.ajegroup.com AJEGROUP adalah perusahaan yang memproduksi, mendistribusikan dan memasarkan sirup dan minuman tak berakohol ...

 

Artikel ini sebatang kara, artinya tidak ada artikel lain yang memiliki pranala balik ke halaman ini.Bantulah menambah pranala ke artikel ini dari artikel yang berhubungan atau coba peralatan pencari pranala.Tag ini diberikan pada April 2017. Masaki SaitoInformasi pribadiNama lengkap Masaki SaitoTanggal lahir 23 Juni 1980 (umur 43)Tempat lahir Prefektur Saitama, JepangPosisi bermain PenyerangKarier senior*Tahun Tim Tampil (Gol)2006-2007 Tokyo Verdy * Penampilan dan gol di klub senior han...

مرحبا بكم في رايليزWelcome to the Rileys (بالإنجليزية) معلومات عامةالصنف الفني فيلم دراما[1][2][3] المواضيع دعارة — عائلة مختلة تاريخ الصدور 2010 7 أبريل 2011[4] (ألمانيا) مدة العرض 110 دقيقة اللغة الأصلية الإنجليزية البلد  الولايات المتحدة المملكة المتحدة موقع التصوير ...

 

Greyhound racing operation in London, England Wembley GreyhoundsLocationWembley Stadium, LondonCoordinates51°33′20.0″N 0°16′46.8″W / 51.555556°N 0.279667°W / 51.555556; -0.279667Opened1927Closed1998 Wembley Greyhounds was the greyhound racing operation held at Wembley Stadium in London. Greyhound racing hurdles, Wembley Stadium c.1960 History Origins After the 1924-25 British Empire Exhibition Wembley Stadium was in liquidation before eventually being purch...

 

Voce principale: Fratellanza Sportiva Sestrese Calcio 1919. Questa voce sull'argomento stagioni delle società calcistiche italiane è solo un abbozzo. Contribuisci a migliorarla secondo le convenzioni di Wikipedia. Segui i suggerimenti del progetto di riferimento. Fratellanza Sportiva SestreseStagione 1946-1947Sport calcio Squadra Sestrese Allenatore Ferenc Hirzer Presidente Mario Canepa Serie B19º posto nel girone A. Retrocesso in Serie C. Maggiori presenzeCampionato: Alvigini (...

Cet article est une ébauche concernant une localité italienne et le Trentin-Haut-Adige. Vous pouvez partager vos connaissances en l’améliorant (comment ?) selon les recommandations des projets correspondants. Caldaro - Kaltern Caldaro sulla strada del vino Armoiries Drapeau Noms Nom allemand Kaltern an der Weinstraße Administration Pays Italie Région Trentin-Haut-Adige  Province Bolzano   Code postal 39052 Code ISTAT 021015 Code cadastral B397 Préfixe tel. 0471 Démogr...

 

Artikel ini tidak memiliki referensi atau sumber tepercaya sehingga isinya tidak bisa dipastikan. Tolong bantu perbaiki artikel ini dengan menambahkan referensi yang layak. Tulisan tanpa sumber dapat dipertanyakan dan dihapus sewaktu-waktu.Cari sumber: Nancy Pelosi – berita · surat kabar · buku · cendekiawan · JSTOR Nancy Pelosi Ketua Dewan Perwakilan Rakyat Amerika Serikat ke-52Masa jabatan3 Januari 2019 – 7 Januari 2023PendahuluPaul Ry...

 

Pour les articles homonymes, voir Corman. Si ce bandeau n'est plus pertinent, retirez-le. Cliquez ici pour en savoir plus. Cet article ne cite pas suffisamment ses sources (mars 2017). Si vous disposez d'ouvrages ou d'articles de référence ou si vous connaissez des sites web de qualité traitant du thème abordé ici, merci de compléter l'article en donnant les références utiles à sa vérifiabilité et en les liant à la section « Notes et références ». En pratique :...

County in Iowa, United States County in IowaClayton CountyCountyWinter scene near ElkaderLocation within the U.S. state of IowaIowa's location within the U.S.Coordinates: 42°50′37″N 91°20′36″W / 42.843611111111°N 91.343333333333°W / 42.843611111111; -91.343333333333Country United StatesState IowaFounded1837Named forJohn M. ClaytonSeatElkaderLargest cityGuttenbergArea • Total793 sq mi (2,050 km2) • Land779...

 

Canadian screenwriter and film director Not to be confused with Katharine Hepburn. Kathleen HepburnNationalityCanadianOccupation(s)Screenwriter, film director Kathleen Hepburn is a Canadian screenwriter and film director. She first attracted acclaim for her film Never Steady, Never Still, which premiered as a short film in 2015 before being expanded into her feature film debut in 2017.[1] The film received eight Canadian Screen Award nominations at the 6th Canadian Screen Awards in 20...

 

尤睦佳·泽登巴尔Юмжаагийн Цэдэнбал1970年代时的尤睦佳·泽登巴尔蒙古人民革命党中央委员会总书记任期1958年11月22日—1984年8月24日前任达希·丹巴(第一书记)继任姜巴·巴特蒙赫任期1940年4月8日—1954年4月4日前任达希·丹巴(第一书记)继任达希·丹巴(第一书记)蒙古人民共和國部長會議主席任期1952年1月26日—1974年6月11日前任霍尔洛·乔巴山继任姜巴·巴特蒙赫�...

London Road CemeteryDetailsEstablished1847 (1847)LocationCoventryCountryEngland, UKCoordinates52°23′47″N 1°29′54″W / 52.3964°N 1.4982°W / 52.3964; -1.4982Size17 hectares (42 acres)Websitewww.lrcemetery.co.ukFind a GraveLondon Road Cemetery London Road Cemetery is a 17-hectare (42-acre)[1] cemetery in Coventry, England, designed by Joseph Paxton[2] and opened in 1847.[1] It lies south-east of the city centre and is bisected by t...

 

Živko Topalović(left) talking with Draža Mihailović(right) Živko Topalović (21 March 1886 in Užice – 11 February 1972 in Vienna) was a Yugoslav socialist politician. Topalović became a leading figure in the Socialist Party of Yugoslavia, founded in 1921.[1][2] During World War II he became a prominent member of Draža Mihailović's Chetniks. Interwar period Topalović was leader of the 'centralist' faction in the Communist Party of Yugoslavia, which opposed the w...

 

Colloquialism for a location featuring high or potential Black economic prosperity Part of a series onAfrican Americans History Periods Timeline Atlantic slave trade Abolitionism in the United States Slavery in the colonial history of the US Revolutionary War Antebellum period Slavery and military history during the Civil War Reconstruction era Politicians Juneteenth Civil rights movement (1865–1896) Jim Crow era (1896–1954) Civil rights movement (1954–1968) Black power movement Post–...

  هذه المقالة عن العاصمة اللبنانية. لمعانٍ أخرى، طالع بيروت (توضيح).   للمحافظة، طالع بيروت (محافظة).   بيروت بيروت  منظر عام لشبه جزيرة بيروت في يوليو 2015. بيروتعلم بيروت بيروتشعار بيروت خريطة لأبرز شوارع وأحياء بيروت. اللقب أم الشرائع، ست الدنيا، باريس الشرق ت�...

 

Church in New South Wales, AustraliaSt James' Church, SydneySt James, King StreetSt James' Church in about 1890, by Henry KingSt James' Church, SydneyLocation in the Sydney central business district33°52′10″S 151°12′40″E / 33.8694°S 151.2111°E / -33.8694; 151.2111Location173 King Street, Sydney central business district, New South WalesCountryAustraliaDenominationAnglican Church of AustraliaChurchmanshipAnglo-CatholicWebsiteSt James'HistoryStatusParish chu...

 

تحتاج هذه المقالة كاملةً أو أجزاءً منها لإعادة الكتابة حسبَ أسلوب ويكيبيديا. فضلًا، ساهم بإعادة كتابتها لتتوافق معه. هذه المقالة بحاجة لمراجعة خبير مختص في مجالها. يرجى من المختصين في مجالها مراجعتها وتطويرها. اقتصاد تركياليفينت المنطقة التجارية في إسطنبولعامالدولة تركي...

Roman physician and encyclopaedist (c. 25 BC - c. 50 AD) For other people named Celsus, see Celsus (disambiguation). Aulus Cornelius CelsusBornc. 25 BCDiedc. 50 AD (aged roughly 75)OccupationEncyclopaedist Aulus Cornelius Celsus (c. 25 BC – c. 50 AD) was a Roman encyclopaedist, known for his extant medical work, De Medicina, which is believed to be the only surviving section of a much larger encyclopedia. The De Medicina is a primary source on diet, pharmacy, surgery and related fields, and...

 

The O2 ArenaNorth Greenwich Arena LokasiLokasiThe O2 Drawdock Road North Greenwich London, SE10 0BB InggrisKoordinat51°30′10.79″N 0°0′11.28″E / 51.5029972°N 0.0031333°E / 51.5029972; 0.0031333KonstruksiDibuatAntara 2003 dan 2007Dibuka24 Juni 2007ArsitekPopulous[1] (HOK Sport)Insinyur strukturBuro HappoldInsinyur pemeliharaanM-E EngineersKontraktor umumSir Robert McAlpineData teknisPermukaanVersatileKapasitas20.000[2]Situs webtheo2.co.ukPemak...