The thesis deals with the complexity of the WPA3 protocol. This is the latest wireless security algorithm. We are interested in how this algorithm works in practice, and how it impacts the security of wireless communication. The first part of the thesis provides an overview of previously used security protocols, specifically WEP, WPA and WPA2. It focuses on their operation and it highlights their vulnerabilities. Next part of the thesis is a description of the WPA3 protocol. It thoroughly explains the cryptography used in it's encryption and describes protocols key derivation. It also includes a comparison between past protocols and WPA3. The thesis concludes with a comprehensive overview of WPA2 and WPA3 attacks.
|