WPA protocol work

 WPA (Wi-Fi Protected Access)



The Temporal Key Integrity Protocol is implemented by the WPA protocol (TKIP). WEP uses a 64-bit or 128-bit encryption key that must be manually entered and does not change on wireless access points and devices. TKIP uses a per-packet key, which means it produces a new 128-bit key for each packet dynamically, preventing the types of attacks that harmed WEP.

WPA-Personal, often known as WPA-PSK (Pre-Shared Key), is a home or small network security protocol. It employs a single password for all users. This technique is simple to set up, but if one device is compromised, the passwords on all other devices on the network must be changed.

WPA-Enterprise, commonly known as WPA-802.1x, is a security protocol for medium and large networks (in a big company for example). This system requires a RADIUS server, and users connect to the network using their personal identify. This system is more complex to set up, but it provides for user-by-user management. It is feasible to revoke a device's access without affecting anything on the other devices if it has been compromised.

When a client attempts to connect to an authenticator, the 4-way handshake protocol is initiated, which generates a Pairwise Transient Key (PTK). This key is used to encrypt data between a client and an access point, and it changes every 65,535 packets at the absolute least. When compared to WEP, this is a significant improvement.





Post a Comment

0 Comments

Close Menu