Cryptography Reference
In-Depth Information
Alice
Bob
r A
Derive EK , MK , DEK , DMK
r B || MAC MK ( r B )
Derive EK , MK , DEK , DMK
Ready to start || MAC MK (ready to start)
Figure 12.5. WPA authentication and key establishment protocol
3. Bob then sends r B to Alice, along with a MAC computed on r B using MAC
key MK .
4. Alice uses r A , r B and PMK to derive the four session keys. She then checks the
MAC that she has just received from Bob.
5. Alice sends a message to Bob stating that she is ready to start using encryption.
She computes a MAC on this message using MAC key MK .
6. Bob verifies the MAC and sends an acknowledgement to Alice.
At the end of this protocol both Alice and Bob have achieved mutual entity
authentication, since each has demonstrated knowledge of PMK by successfully
computing MACs using MK , which is derived from PMK . (Strictly speaking, Bob
has only achieved assurance that Alice is one of the authorised users of theWLAN,
since there may be more than one user sharing PMK with Bob.) In addition, Alice
and Bob have agreed on four session keys. Two of these, DEK and DMK , will be
used to secure the data exchanged between Alice and Bob in the coming session
(the fourth key EK plays a role in group key management, which we will not
discuss).
CONFIDENTIALITY AND DATA ORIGIN AUTHENTICATION IN WPA
WPA and WPA2 differ in the way that they provide protection for the data
exchanged during a communication session between a device and a wireless access
point. Recall that WPA was designed as a temporary 'fix' of WEP, while WPA2 is
a complete redesign.
While WPA still uses RC4, it features several design improvements:
• The RC4 encryption key is created by mixing DEK and an IV, rather than
concatenating, as in WEP. Further, a separate encryption key is derived by such
 
Search WWH ::




Custom Search