The Four-Way Handshake

本文详细介绍了WPA协议中的四次握手过程,包括认证过程、密钥交换和密钥生成机制,阐述了PMK、PTK、GTK等关键概念以及它们在确保无线网络安全中的作用。

 

The authentication process leaves two considerations: the access point (AP) still needs to authenticate itself to the client station (STA), and keys to encrypt the traffic need to be derived. The earlier EAP exchange has provided the shared secret key PMK (Pairwise Master Key). This key is, however, designed to last the entire session and should be exposed as little as possible. Therefore the four-way handshake is used to establish another key called the PTK (Pairwise Transient Key). The PTK is generated by concatenating the following attributes: PMK, AP nonce (ANonce), STA nonce (SNonce), AP MAC address, and STA MAC address. The product is then put through a cryptographic hash function.

The handshake also yields the GTK (Group Temporal Key), used to decrypt multicast and broadcast traffic. The actual messages exchanged during the handshake are depicted in the figure and explained below:

The Four-Way Handshake in 802.11i
  1. The AP sends a nonce-value to the STA (ANonce). The client now has all the attributes to construct the PTK.
  2. The STA sends its own nonce-value (SNonce) to the AP together with a MIC, including authentication, which is really a Message Authentication and Integrity Code: (MAIC).
  3. The AP sends the GTK and a sequence number together with another MIC. This sequence number will be used in the next multicast or broadcast frame, so that the receiving STA can perform basic replay detection.
  4. The STA sends a confirmation to the AP.

All the above messages are sent as EAPOL-Key frames.

As soon as the PTK is obtained it is divided into five separate keys:

PTK (Pairwise Transient Key – 64 bytes)

  1. 16 bytes of EAPOL-Key Confirmation Key (KCK)– Used to compute MIC on WPA EAPOL Key message
  2. 16 bytes of EAPOL-Key Encryption Key (KEK) - AP uses this key to encrypt additional data sent (in the 'Key Data' field) to the client (for example, the RSN IE or the GTK)
  3. 16 bytes of Temporal Key (TK) – Used to encrypt/decrypt Unicast data packets
  4. 8 bytes of Michael MIC Authenticator Tx Key – Used to compute MIC on unicast data packets transmitted by the AP
  5. 8 bytes of Michael MIC Authenticator Rx Key – Used to compute MIC on unicast data packets transmitted by the station

The Michael MIC Authenticator Tx/Rx Keys provided in the handshake are only used if the network is using TKIP to encrypt the data.

 

 

http://www.stanford.edu/class/cs259/WWW04/projects/project04/04%20-%20Slides.pdf

MPLLA force enable. When asserted, the corresponding MPLL is forced to be powered up, irrespective of the txX_mpll_en input. DWC_PCLK_AS_PHY_INPUT==ON and pipe_laneX_ext_pll_mode==0 and IN_PCLK SOURCE MPLL_CLK MODE and phyN_mplla_*_clk is used as a source of IN_PCLK): ■ Default value of this signal should be 0b. In initial sequence, this signal should be asserted with either one of following option1 or option2. ■ Initial sequence-Option1 (contact Synopsys for details) : This signal can be asserted when phy_reset is de-asserted and pipe_laneX_reset_n is asserted, with writing to PHY register. Once this signal is asserted, pipe_laneX_reset_n can be deasserted only after phyN_mplla_foce_ack is asserted. ■ Initial sequence-Option2(regular sequence) : This signal can be asserted after phy_reset and pipe_laneX_reset_n is de-asserted and after pipe_laneX_phystatus is also de-asserted. ■ The signal should be kept 1b when any links which use the MPLL clock as Input PCLK are in PCLK on powerdown states. ■ This signal should be updated from 1b to 0b only after all links which use the MPLL clock as source of Input PCLK complete PCLK off powerdown state transition(PCIe : P1_CPM, P2, P2_CPM, P2_NOBEACON ). Phystatus are 1-shot pulse with synchronous to PCLK, and PCLK can be disable only after that. ■ This signal should be updated from 0b to 1b before any links which use the MPLL clock as Input PCLK exit from PCLK off powerdown states (PCIe : P1_CPM, P2, P2_CPM, P2_NOBEACON). PowerDown is synchronous to PCLK, and PCLK should be active before changing the signal. ■ A four-way request-ack handshake must be followed with phyN_mplla_force_ack signal. This signal can be changed from 0b to 1b only when phyN_mplla_force_ack==0b.This signal can be changed from 1b to 0b only when phyN_mplla_force_ack==1b. (DWC_PCLK_AS_PHY_INPUT==OFF) || (DWC_PCLK_AS_PHY_INPUT==ON and pipe_laneX_ext_pll_mode==0 and IN_PCLK SOURCE MAX_PCLK MODE) || (DWC_PCLK_AS_PHY_INPUT==ON and pipe_laneX_ext_pll_mode==1) || (DWC_PCLK_AS_PHY_INPUT==ON and pipe_laneX_ext_pll_mode==0 and IN_PCLK SOURCE MPLL_CLK MODE and phyN_mplla_*_clk is NOT used as a source of IN_PCLK)
06-19
多角色体系 支持管理员、商家、消费者三种角色,权限分级管控: 管理员:负责平台整体配置、用户审核、数据监控等全局操作。 商家:管理店铺信息、发布商品、处理订单、回复评价等。 消费者:浏览商品、加入购物车、下单支付、评价商品等。 实现用户注册(手机号 / 邮箱验证)、登录(支持密码 / 验证码 / 第三方登录)、个人信息管理(头像、收货地址、密码修改)。 权限精细化控制 商家仅能管理自家店铺及商品,消费者仅能查看和购买商品,管理员拥有全平台数据访问权限。 二、商品管理功能 商品信息维护 商家可发布商品:填写名称、分类(如服饰、电子产品)、子类别(如手机、笔记本)、规格(尺寸、颜色、型号)、价格、库存、详情描述(图文)、物流信息(运费、发货地)等。 支持商品上下架、库存调整、信息编辑,系统自动记录商品状态变更日志。 商品分类与搜索 按多级分类展示商品(如 “数码产品→手机→智能手机”),支持自定义分类体系。 提供智能搜索功能:按关键词(名称、品牌)搜索,支持模糊匹配和搜索联想;结合用户浏览历史对搜索结果排序(优先展示高相关度商品)。 商品推荐 基于用户浏览、收藏、购买记录,推荐相似商品(如 “浏览过该商品的用户还买了…”)。 首页展示热门商品(销量 TOP10)、新品上架、限时折扣等推荐列表。 三、订单与交易管理 购物车与下单 消费者可将商品加入购物车,支持修改数量、选择规格、移除商品,系统自动计算总价(含运费、折扣)。 下单流程:确认收货地址→选择支付方式(在线支付、货到付款)→提交订单→系统生成唯一订单号。 订单处理流程 订单状态跟踪:待支付→已支付→商家发货→物流运输→消费者收货→订单完成,各状态变更实时通知用户。 商家端功能:查看新订单提醒、确认发货(填写物流单号)、处理退款申请(需审核理由)。 消费者端功能:查看订单详情、追踪物流、申请退款 / 退货、确认收货。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值