NET-2020-11-1_02
NET-2020-11-1_02
Abstract—Due to the widespread usage of WiFi, securing in terms of hardware demands. The main reason for the
them is and will continue to be an important task. After latter is the utilization of Counter Mode with Cipher
it was signed into IEEE 802.11 in 2004, WPA2 became the Block Chaining Message Authentication Code Protocol
commonly used encryption standard for WiFi networks, re- (CCMP), which uses the Advanced Encryption Standard
placing the originally as temporary solution conceived WPA. (AES) block cipher for its data encryption. Both of which
It’s successor WPA3 was released in June 2018. At the time are described in more detail in the following sections.
of writing it has not found widespread adoption yet. This Temporal Key Integrity Protocol (TKIP) is still available
paper aims to provide an overview on the designs of WPA2 under WPA2, in order to provide backward compatibility
and WPA3, including their currently known vulnerabilities. to WPA capable devices that possess insufficient process-
And tries to come to a conclusion on whether WPA3 is still ing power for AES.
a viable successor or if it has already been compromised
beyond repair. Client AP
join request
Index Terms—wireless networks, WPA2, WPA3, Encryption,
KRACK-Attack, Dragonblood-Attack acknowledge request
Generate Anonce
Anonce (Msg. 1)
1. Introduction Generate Snonce
Snonce, MIC (Msg. 2)
Build PTK & MIC
Created as a guideline for wireless connected networks Build and validate PTK
in 1997, IEEE 802.11 also defined security protocols for Encryp. GTK (Msg. 3)
Encrypt GTK
such networks and as such has been revised multiple times Decrypt GTK
in reaction to emerging technologies and attack methods. Install PTK & GTK
The original security mechanism WEP was replaced in Confirm (Msg. 4)
2003 in favor of the at them time new WPA. The main Install PTK
4. Conclusion
WPA3 was meant to solve most of the vulnerabilities
that WPA2 had. None of the known WPA2 specific attack
methods went unaddressed and all of the vulnerabilities
described in the WPA2 section 2.4 were fixed. Due to the