SEARCH
— 葡萄酒 | 威士忌 | 白兰地 | 啤酒 —
— 葡萄酒 | 威士忌 | 白兰地 | 啤酒 —
My router’s security mode is set to “WPA2-PSK/WPA3-SAE.” My new phone supports Wi-Fi 6 and WPA3, but it disconnects and reconnects to the Wi-Fi network every 12 hours or so. Other Wi-Fi 6 devices in my home do not have this issue. After packet analysis by the phone manufacturer, they said this is a WPA3 protocol issue that requires renewal. Is this statement correct?
The engineer is diligent and responsible, and the product has no issues. The PTK (Pairwise Transit Key) is simply configured to expire after 43200 seconds, which is 12 hours.
From the image, we can see that the MSK (Master Session Key) update interval is 86400 seconds, which is 24 hours.
I remember an article mentioning that wireless network security mainly revolves around the PMK (Pairwise Master Key). Why isn’t the PMK mentioned here?
The PMK is derived from the MSK. For example, if the MSK is 512 bits long, the protocol allows for the extraction of the first 256, 384, or 512 bits from the MSK. Different encryption algorithms may require different lengths. Therefore, the MSK is long enough to meet the extraction needs of various encryption algorithms, providing flexibility.
The life cycle of the PMK is equal to the life cycle of the MSK, which is 24 hours.
If the PMK is derived by shortening the MSK, what is the relationship between the PTK and the PMK?
The PTK is derived by each party contributing a nonce and then combining it with the PMK according to the algorithm.
Once the PMK expires, the PTK also expires, so the PTK life time ≤ PMK life time == MSK life time.
No, the PTK is still an intermediate transitional key.
Both parties derive KCK (Key Confirmation Key), KEK (Key Encryption Key), and TK (Temporal Key) from the PTK using predefined algorithms. As long as both parties have the same PTK, the highlighted three keys will also be the same.
What users are most concerned about is the TK, which is used to encrypt/decrypt user data.
The life cycle relationship is as follows:
TK life time == PTK life time ≤ PMK life time == MSK life time
However, based on the image and real-world experience, the TK is continuously used for encryption/decryption during its lifetime (12 hours), which does not meet the one-time use requirement.
Have readers heard of initialization vectors (IVs), nonces, random numbers, and salts?
They are essentially the same thing. Each time a different IV/nonce is used in a calculation (such as XOR) with the TK, the output = key pad. As long as the IV/nonce used for each encryption is different, even if the TK remains unchanged, the key pad will always be different.
What is the key pad for?
The key pad is used in one-time pad encryption/decryption algorithms, appearing as a randomized sequence of 128/192/256 bits.
It can be sent in plaintext along with the packet.
However, as different IV/nonces are used within a limited length (usually 128 bits), the remaining options decrease over time. If the sender accidentally reuses the same IV/nonce, it poses a significant security risk in encryption algorithms and must be absolutely avoided.
How to avoid it?
By forcing the PTK to expire, thereby deleting the PTK SA and TK SA, making the TK expire (here, 12 hours) and unable to be reused.
As long as both parties use the PMK (which has 12 hours left before expiration), they can perform a 4-way handshake, each contributing a new nonce, and derive a new PTK and TK, naturally meeting the one-time use requirement of the algorithm!
If using 802.1x (EAP/TLS) authentication, it is obtained from the EAP TLS secure connection negotiation.
If using PSK authentication, it is derived from the password, both parties’ MAC addresses, and predefined characters.
Lastly, the SAE authentication used in WPA3 involves elliptic curve cryptography (ECC). Essentially, it involves deriving a starting point on the elliptic curve, called the base point. Understanding the base point and the cyclic nature of elliptic curve discrete finite elements makes the series of calculations involving public and private keys as fun and playful as a child’s game.
You might face issues with your cellular router, like connectivity hiccups, configuration errors, or performance lags. These problems can disrupt your internet experience. Troubleshooting becomes crucial to keep your router running smoothly.
View detailsIn the rapidly evolving landscape of industrial connectivity, 5G technology promises to revolutionize the way we approach data transmission and network management. At the forefront of this technological shift are industrial 5G routers with SIM car...
View detailsWAN (Wide Area Network) ports are a crucial interface on industrial cellular routers, enabling external network connectivity and advanced functions. This article examines the key roles of the WAN port on the Yeaplink SR500 industrial cellular router.
View detailsData center switches are designed to meet the unique high-performance, high reliability, and scalability requirements of data centers. Meanwhile, while regular switches perform well in small networks or home environments, their limitations become ...
View detailsMo