In the first part of this series, we examined WEP as presented in our CCNA Wireless Course. To read that first part, click here.

The WiFi Alliance introduced Wi-Fi Protected Access (WPA) in 2003 as a replacement technology for WEP. WPA is based on the 802.11i draft version 3. This improved technology relies upon Temporal Key Integrity Protocol (TKIP) to automate the changing of keys. Remember that a huge issue for WEP was the single, static key in use. Interestingly, WPA uses the RC4 encryption algorithm like WEP; although Advanced Encryption Standard (AES) can also be used if desired.

WPA can be implemented using two authentication modes:

  • Enterprise Mode - this mode requires a RADIUS server for authentication and key distribution
  • Personal Mode - this mode uses pre-shared keys; you have most likely seen this option in your home WiFi environments

WPA Enterprise Mode features the following steps:

  1. The client and Access Point (AP) agree on security capabilities.
  2. 802.1x authentication completes.
  3. The authentication server derives a master key and sends this key to the AP; the client derives the same key. This is called the Pairwise Master Key (PMK) and lasts for the duration of the session.
  4. A four-way handshake occurs that creates a new key called the Pairwise Transient Key (PTK). This process occurs between the client and the authenticator. This key is used to confirm the Pairwise Master Key (PMK), creates a temporal key for encryption, and creates keying material for the next step.
  5. The two-way group key handshake process begins. Here the client and authenticator create a Group Transient Key (GTK). This key is used to decrypt broadcast and multicast traffic.

WPA was engineered to be implemented in devices that had previously only supported WEP. These devices (in most cases) merely required a firmware update in order to support the much stronger security protocol.

About INE

INE is the premier provider of technical training for the IT industry. INE is revolutionizing the digital learning industry through the implementation of adaptive technologies and a proven method of hands on training experiences. Our portfolio of trainings is built for all levels of technical learning, specializing in advanced networking technologies, next generation security and infrastructure programming and development. Want to talk to a training advisor about our course offerings and training plans? Give us a call at 877-224-8987 or email us at sales@ine.com

Subscribe to INE Blog Updates

New Blog Posts!