CourseWork2 CST3510 Three Way Handshake Notes
CourseWork2 CST3510 Three Way Handshake Notes
The handshake takes place after the client device has successfully authenticated
with the access point, but before data transfer begins. It is called a "3-Way"
Handshake because it involves three main steps to complete.
---
---
---
## 4. **Key Generation**
At the core of the 3-Way Handshake is the generation of the **Pairwise Transient
Key (PTK)**, which is used to encrypt data between the client and the AP during the
session.
The PTK is used to encrypt and protect communication between the client and the
access point during the session.
---
- **Authentication:** It helps confirm that both the client and AP know the shared
secret (PSK) or have completed a proper authentication procedure.
- **Security:** By using nonces (ANonce and SNonce), the handshake ensures that the
process is not replayable by attackers.
- **Key Exchange:** The handshake enables both the AP and client to generate a
fresh, unique session key (PTK) for data encryption.
- **Session Integrity:** The MICs included in each message ensure the integrity of
the messages, preventing man-in-the-middle attacks.
---
---
## 7. **Security Considerations**
### b. **Eavesdropping**
Although the handshake itself is not encrypted, the nonces (ANonce and SNonce) are
random values, making it difficult for attackers to predict and derive the key
material. The PTK is used to encrypt the actual data once the handshake is
complete.
---
## 8. **Conclusion**
The Wi-Fi 3-Way Handshake is a critical process for establishing secure
communication between a client and an access point in WPA and WPA2 networks. It
ensures that both parties are authenticated, a shared secret is exchanged, and a
secure encryption key is generated for protecting data transmitted over the
wireless network. Understanding how the handshake works is fundamental for anyone
working with wireless security and is a key concept in protecting Wi-Fi networks
from unauthorized access and attacks.