EAP-PEAP Handshake

Excerpt From Wi-fi-vulnerabilities part 2 Webinar

CTO Dr. Brett Walkenhorst Explains EAP-PEAP Handshake.

Protected Extensible Authentication Protocol, or EAP-PEAP, is a set of more than forty authentication techniques. In order to create a secure tunnel where other EAP protocol actions take place, PEAP acts as the outer layer. To securely exchange credentials, the procedure involves server-client exchanges, TLS tunnel setup, identity exchange, and challenge-response phases. Secure communication is made possible by the generation of session keys from a symmetric key created during the TLS tunnel construction, following successful authentication. In business network contexts, this technique guarantees safe encryption and authentication.

For more on Wireless Threat Intelligence:

For more information: