How are encryption keys derived between NAS and Supplicant for 802.1x when using EAP as authentication method?

I’m wondering how key negotiation works for WPA2 Enterprise where a clear text protocol like EAP is used to authenticate the user. All the info I was able to find suggests that EAP is an inherently insecure authentication met… Continue reading How are encryption keys derived between NAS and Supplicant for 802.1x when using EAP as authentication method?

How DHCP client can determine that 802.1x Port based authentication has been completed and its time to trigger DHCP discover

I have a Supplicant running on 1 Linux box attached with a Free radius server on other linux box with cisco catalyst switch (with 802.1x Port based access) in between. Now I have been able to successfully complete the authent… Continue reading How DHCP client can determine that 802.1x Port based authentication has been completed and its time to trigger DHCP discover

What is stronger – WPA2 Enterprise with 2048 bit key, or Personal with 63 character passphrase?

Which of the two following has a stronger cryptographic strength in withstanding brute-force attacks?

WPA/WPA2 Enterprise using 2048-bit RSA public-key
WPA/WPA2 Personal using 63-character Passphrase

Continue reading What is stronger – WPA2 Enterprise with 2048 bit key, or Personal with 63 character passphrase?