Excerpt From Wi-fi-vulnerabilities part 2 Webinar
CTO Dr. Brett Walkenhorst Explains EAP-PEAP Handshake.
Protected Extensible Authentication Protocol, or EAP-PEAP, is a set of more than forty authentication techniques. In order to create a secure tunnel where other EAP protocol actions take place, PEAP acts as the outer layer. To securely exchange credentials, the procedure involves server-client exchanges, TLS tunnel setup, identity exchange, and challenge-response phases. Secure communication is made possible by the generation of session keys from a symmetric key created during the TLS tunnel construction, following successful authentication. In business network contexts, this technique guarantees safe encryption and authentication.
UPCOMING REPORT: The Need for Wireless Airspace Defense
Get early access