S 2.388 Appropriate key management for WLAN

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

The use of cryptographic security mechanisms requires the confidential, integral and authentic generation, distribution, and installation of suitable keys (see also S 2.46 Appropriate key management). When using WEP and WPA-PSK or WPA2-PSK, the security of the WLAN depends primarily on the selection of suitable WLAN keys that have not been compromised. For this reason, a suitable method for key management must be selected which fits the existing cryptographic mechanisms. In this case, we differentiate between two types of key management: static (manual) and dynamic key management.

WEP

In WEP, only a single, static key is used, i.e. the same WEP key must be entered in every WLAN component in a network. Furthermore, WEP has no provisions for dynamic key management, and so the keys need to be administered manually. Since WEP keys can be compromised in a very short amount of time, WEP should not be used any more. However, if it is necessary for some reason to use WEP, then the keys must be changed regularly by hand (at least once per day).

WPA / WPA2 with TKIP or CCMP

WPA uses TKIP, which permits the use of dynamic cryptographic keys instead of just the static keys permitted by WEP. In IEEE 802.11i (WPA2), CCMP is also used as the cryptographic method for ensuring data integrity and for encrypting the user data.

TKIP and CCMP are symmetric methods, which means all communication partners must have a shared key configured. This key is referred to as the Pairwise Master Key (PMK). The Pairwise Master Key (PMK) can be sent to the participating WLAN components in one of two ways:

In general, the keys of all WLAN components should be changed at regular intervals, but at least once every 3 months. In large installations, the central WLAN management solution should contain a suitable function for this purpose to keep the amount of work necessary to a minimum.

The changing of the key information should be tested specifically on all WLAN components during the planning phase so that any possible problems with changing the keys are detected early.

Review questions: