WPA (Wi-Fi Protected Access)
The Temporal Key Integrity
Protocol is implemented by the WPA protocol (TKIP). WEP uses a 64-bit or
128-bit encryption key that must be manually entered and does not change on
wireless access points and devices. TKIP uses a per-packet key, which means it
produces a new 128-bit key for each packet dynamically, preventing the types of
attacks that harmed WEP.
WPA-Personal, often known
as WPA-PSK (Pre-Shared Key), is a home or small network security protocol. It
employs a single password for all users. This technique is simple to set up,
but if one device is compromised, the passwords on all other devices on the
network must be changed.
WPA-Enterprise, commonly
known as WPA-802.1x, is a security protocol for medium and large networks (in a
big company for example). This system requires a RADIUS server, and users
connect to the network using their personal identify. This system is more
complex to set up, but it provides for user-by-user management. It is feasible
to revoke a device's access without affecting anything on the other devices if
it has been compromised.
When a client attempts to
connect to an authenticator, the 4-way handshake protocol is initiated, which
generates a Pairwise Transient Key (PTK). This key is used to encrypt data
between a client and an access point, and it changes every 65,535 packets at
the absolute least. When compared to WEP, this is a significant improvement.

0 Comments