It is the powerpoint slide.It is all about WPA 3.It will make wifi more secure.This is the future of wireless security.Know how the man in the middle attack and krack attack works.Know also about RC4 encryption.
2. Content
Introduction .
List of Wireless Security Protocols.
WEP(Wired Equivalent Privacy).
WPA(Wi-Fi Protected Access).
WPA Vulneribilities.
WPA2 and its limitation.
What is Man in the middle attack ?
What is KRACK ?
Tools.
Advantages of WPA3.
Summary.
3. Introduction
“WPA” stands for Wi-Fi Protected
Access.
WPA 3 is the next generation of wi-fi
security.
It is standard version of WPA2.
WPA3 will add new features to simplify
Wi-Fi security.
4. List of Wireless Security
Protocols
WEP(Wired Equivalent Privacy)
WPA(Wi-Fi Protected Access).
WPA2(Wi-Fi Protected Access I
5. WEP(Wired Equivalent
Privacy
It was developed in 1997.
part of the IEEE 802.11
It use 64bit encryption.
It uses the RC4 encryption protocol to secure
the data.
specification ƒgoal :
make the WiFi network at least as secure as a
wired LAN (that has no particular protection
mechanisms)
6.
7. WPA(Wi-Fi Protected Access
Developed by the Wi-Fi Alliance to secure
wireless computer networks
• It was adopted in 2003 to solve weakness in
WEP
• Standardized in IEEE 802.11i
• Increased in safety: encryption 128 bits
• Known as TKIP(Temporal key Integrity)
• It uses RC4 encryption to secure the data
• It uses the MIC and frame counter to verify
the integrity of the data.
9. WPA Vulnerabilities
Weakness in the key
combination algorithm
PSK is vulnerable to
eavesdropping and
dictionary attack.
TKIP vulnerability allows
attacker to guess IP
address of the subnet.
10. WPA2
WPA2 is the security method
added for wireless networks that
provides stronger data protection and
network access control.
Has replaced WPA.
Was adopted in 2004.
WPA2 has two types : WPA2-
Personnal,WPA-Enterprise.
11. WPA 2 Encryption
WPA2 uses AES with a key length of
128 bit to encrypt data.
12. Limitation of WPA2
The Password can be cracked online.
Anyone can disconnect you.
Once anyone know the password he
can spoof or sniff the wifi users by
“Man in the middle attack”.
A hacker can hack the whole wifi
network and its user by using
“KRACK”.
13. What is Man in the middle attack
?
Man in the middle attack is a attack where
attacker secretly steal the data and
information of victim which is sending to
the web servers.
14. KRACK (Key Reinstallation
Attack)
•KRACK ("Key Reinstallation Attack") is a severe replay
attack (a type of exploitable flaw) on the Wi-Fi Protected
Access protocol that secures Wi-Fi connections
•It was discovered in 2016
•It was discovered by Belgian researchers Mathy Vanhoef and
Frank Piessens.
15. Tools
Here are the some tools that bypass
wireless securities :
16. Advantages of WPA3
Password protection.
Protection against KRACK and Man in
the middle attack.
It will simplify to connect with wifi.
Stronger encryption.
Protect public Wi-Fi.
17. Summary
1.WPA2 is the improved version of
WPA.
2.WPA only supports TKIP encryption
while WPA2 supports AES.
3.WPA2 requires more processing
power than WPA