Abstract

AbstractWireless networks are a classic application area of cryptography. Since any receiving device can record radio signals within range, the confidentiality of data can only be guaranteed by encryption. After a short introduction to LAN technologies and LAN-specific attacks, we will have a closer look at three generations of WLAN security technologies. Although WEP is known to be insecure and should no longer be deployed, we described the attacks on WEP in detail. This is because the Fluhrer-Mantin-Shamir attack provides a prime example of why long-lived keys should not be used directly to encrypt data. The development of WPA shows how to migrate an insecure system step-by-step to a more secure state. The KRACK attack on WPA2 exemplifies the influence of network technologies (in this case, UDP) on system security. Finally, the Dragonfly handshake from WPA3 is a new approach to using low-entropy passwords to establish authenticated session keys. Detailed information on LAN technologies can be found in textbooks on computer networks, e.g., [20].

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call