Page 204 - StudyBook.pdf
P. 204

188    Chapter 4 • Communication Security: Wireless

             challenge, which is sent from authenticator to requestor, is sent in the clear.The
             requesting client then transmits the same challenge, encrypted using the WEP
             secret key, back to the authenticator.An attacker who captures both of these
             packets now has two pieces of a three-piece puzzle: the cleartext challenge and the
             encrypted ciphertext of that challenge.The algorithm RC4 is also known.All that
             is missing is the secret key.To determine the key, the attacker may simply try a
             brute force search of the potential key space using a dictionary attack.At each step,
             the attacker tries to decrypt the encrypted challenge with a dictionary word as the
             secret key.The result is then compared against the authenticator’s challenge. If the
             two match, then the secret key has been determined. In cryptography, this attack is
             termed a known-plaintext attack and is the primary reason why shared-key authenti-
             cation is actually considered slightly weaker than open authentication.



              TEST DAY TIP
                  While the Security+ exam does not cover the authentication process in
                  great detail, it is important to remember the two authentication mecha-
                  nisms in the 802.11 standard: open and shared-key.





             802.1x Authentication
             The current IEEE 802.11b standard is severely limited because it is available only
             for the current open and shared-key authentication scheme which is non-exten-
             sible.To address the weaknesses in the authentication mechanisms discussed above,
             several vendors (including Cisco and Microsoft) adopted the IEEE 802.1x authen-
             tication mechanism for wireless networks.The IEEE 802.1x standard was created
             for the purpose of providing a security framework for port-based access control
             that resides in the upper layers of the protocol stack.The most common method
             for port-based access control is to enable new authentication and key management
             methods without changing current network devices.The benefits that are the end
             result of this work include the following:

                  ■   There is a significant decrease in hardware cost and complexity.
                  ■   There are more options, allowing administrators to pick and choose their
                      security solutions.






          www.syngress.com
   199   200   201   202   203   204   205   206   207   208   209