Page 203 - StudyBook.pdf
P. 203

Communication Security: Wireless • Chapter 4  187


                 EXAM WARNING
                      Open authentication can also require the use of a WEP key. Do not
                      assume that just because the Security+ exam discusses open authentica-
                      tion that a WEP key should not be set.




                    The shared-key authentication process shown in Figure 4.7 is a four-step pro-
                 cess that begins when the AP receives the validated request for association.After the
                 AP receives the request, a series of management frames are transmitted between the
                 stations to produce the authentication.This includes the use of the cryptographic
                 mechanisms employed by WEP as a validation.The four steps break down in the
                 following manner:

                      1. The requestor (the client) sends a request for association.
                      2. The authenticator (the AP) receives the request, and responds by pro-
                         ducing a random challenge text and transmitting it back to the requestor.
                      3. The requestor receives the transmission, encrypts the challenge with the
                         secret key, and transmits the encrypted challenge back to the authenticator.
                      4. The authenticator decrypts the challenge text and compares the values
                         against the original. If they match, the requestor is authenticated. On the
                         other hand, if the requestor does not have the shared key, the cipher
                         stream cannot be reproduced, therefore the plaintext cannot be discovered,
                         and theoretically the transmission is secured.


                 Figure 4.7 Shared-Key Authentications

                                              Authentication Request

                                              Authentication Response
                                                  (Challenge)                   Wired Network
                                              Authentication Request
                         Wireless Client      (Encrypted Challenge)
                                                 Authentication
                                               Response (Success)
                      Client WEP Key : 12345                      AP WEP Key : 12345



                    One of the greatest weaknesses in shared-key authentication is that it provides
                 an attacker with enough information to try and crack the WEP secret key.The



                                                                              www.syngress.com
   198   199   200   201   202   203   204   205   206   207   208