Saturday, December 18, 2010
Weak current College】 【wireless network encryption skills development.
<br> <br> Many families have set up a wireless network, it has become a trend. But behind the wireless Internet access and a lot of potential security breaches. Wireless network for data transfer via radio waves, is in principle a wireless network .is easier than a wired network, you only need to receive intrusion in the range of the wireless network, you can use your computer into your wireless network. <br> <br> This allows many users think it sounds terrible, or even do not .intend to use the wireless network. In fact, the wireless network in the ongoing development process, the wireless network encryption skills also constantly perfected, and now the wireless routing has a variety of encryption techniques, this let us set up to use a wireless network ., users of the network and data security are a great guarantee. Today, let's look at the current wireless network encryption what skills development. <br> <br> WEP (wired equivalent privacy) <br> <br> Although the name point of .view seems to be a wired network security options, in fact, this is not the case. WEP standard early in the wireless network has been established, the goal is to become a wireless local area network WLAN security protection layer of the necessary, but WEP's .performance is very disappointing. Its roots lie in the design deficiencies. <br> <br> In the use of WEP's system, in a wireless network transmission of data is to use a random key for encryption. However, WEP is used to generate the .key essentials was soon found that predictable, so for potential intruders who can easily intercept and decipher these keys. Even a secondary skill levels of the wireless hackers can in two to three minutes of cracking WEP encryption for high speed. <br> <br> .IEEE802.11 dynamic wired equivalent privacy (WEP) mode is the late 1990s, the then powerful encryption skills as an effective weapon was United States strict export qualification. Fear of a strong encryption algorithm to be cracked, wireless networking products have been export is prohibited .. However, only two years later, the dynamic wired equivalent privacy mode has been found that there are serious shortcomings. But the 1990s of incorrect should not be in the presence of wireless network security or IEEE802.11 standard itself, the wireless networking industry can .'t wait for the electrical and electronics engineers revised standards, so they launched a dynamic key integrity Protocol TKIP (dynamic wired equivalent privacy patch version). <br> <br> Although WEP has proven to be outdated and inefficient, but today in many .contemporary wireless access points and routers, it is still supported. Moreover, it remains to be personal or company use of up to one of the encryption key. If you are using WEP encryption, if you are on your network's security very seriously, then later .as much as possible not to use WEP, because that really is not very secure. <br> <br> WPA-PSK (TKIP) <br> <br> Wireless network security mechanism was originally used was WEP (wired equivalent privacy), .but later found that WEP is very insecure, 802.11 organizations set out to develop a new security standard, which is later 802.11i Protocol. But standards to the last known to be a long time, and the consumer would not be to network security and discard .the original wireless devices, Wi-Fi Alliance in standard launched before 802.11i on the basis of the draft, developed a technique called WPA (Wi-FiProctedAccess) security mechanisms, it uses TKIP (temporal key integrity Protocol), it uses encryption algorithms or .WEP encryption algorithm using RC4, so no need to modify the original wireless device hardware, WPA for WEP in doubt: IV too short, key management is too basic, on the message integrity is not a valid defense, through the software upgrade essentials to improve .network security. <br> <br> The emergence of WPA give the user a complete authentication mechanisms, AP results based on the user's certificate to decide whether or not we can allow it to access the wireless network; authentication successful, according to a variety .of forms (the number of packets transmitted, the user access to network time, etc.) to dynamically alter each access the user's encryption key. In addition, for users in the wireless transmission of packets in the MIC code execution to ensure that user data .is not modified by another user. As a subset of the 802 .11 i standard, WPA core is IEEE802.1x and TKIP (TemporalKeyIntegrityProtocol). <br> WPA considering different users and different security needs, for example: enterprise users requiring a high level .of security (Enterprise), or it may reveal very major business secrets; and home users tend to just use the network to read the Internet, send and receive E-mail, print and share files, the user's security requirements are relatively low. In .order to meet the security requirements of users need, WPA provides two ways to use mode: enterprise mode, family (including small office). <br> <br> According to these two different usage patterns, WPA authentication also there are two different forms .. For large enterprises, often using "802.1x + EAP" forms, user authentication credentials required. But for some small and medium business network or home user, WPA also offers a simplified model, it does not require specialized certification server. This mode is .called "WPA pre-shared key (WPA-PSK)", it only requires that each WLAN node (AP, wireless routers, network cards, etc.), enter a key in advance. <br> <br> This key is only .used for the certification process, and not used to transmit data encrypted. Data encryption key is generated dynamically after the authentication is successful, the system will ensure "aa dense," does not exist like WEP so the whole network share a single encryption key, .Therefore greatly improves system security. <br> <br> WPA2-PSK (AES) <br> <br> After promulgation in 802.11i, Wi-Fi Alliance has launched the WPA2, it supports AES (advanced encryption algorithm), it needs .to support new hardware, it uses CCMP (counter mode cipher-block chaining message integrity code agreement). The WPA/WPA2, PTK build dependent PMK, PMK is in two forms, one is a form of PSK is a preshared key, in the .form of PMK = PSK, and another form, to the authentication server and site in consultations to produce the PMK. <br> <br> IEEE802.11 is developed by the skills of standards developed by the Wi-Fi Alliance is the commercial standards ., developed by Wi-Fi commercialized standard basically all IEEE developed skill standards. WPA (Wi-FiProtectedAccess) in fact is made by the Wi-Fi Alliance's security standards, the commercial purpose of standards is to support the competence-IEEE802.11i oriented security .standards. The WPA WPA2 is actually the second version. WPA is will be two versions of the reasons is that Wi-Fi Alliance of commercial operation. <br> <br> We know that the task force established 802.11i 's purpose is to build a .more secure wireless LAN, so the code for the encryption project in two new security encryption agreement - TKIP and CCMP (some wireless network devices to AES, Word to replace AES-CCMP CCMP). With TKIP although weakness for WEP, made a significant improvement ., but retained the RC4 algorithm and a basic structure, implying that there exist also TKIP RC4 itself implies weakness. Thus creating a whole new 802.11i longer, stronger security, better suited for use in wireless LAN environment agreements-CCMP encryption. So before the .CCMP, TKIP is ready has been completed. <br> <br> But to wait until the finish, and then unveiled CCMP complete IEEE802.11i standard, you may still need some time, but Wi-Fi Alliance in order to make the new .security standards can be deployed as soon as possible, to remove users on wireless LAN security concerns, thereby allowing wireless LAN market can extend from the high speed and thus the application has completed the TKIP IEEE802.11i draft third edition (IEEE802.11idraft3) as .a benchmark in the WPA. The IEEE is complete and publish IEEE802.11i wireless LAN security standards, Wi-Fi Alliance also immediately released the WPA version 2 (WPA2). <br> WPA = IEEE802.11idraft3 = IEEE802.1X/EAP + .WEP (optional item) / TKIP <br> <br> WPA2 = IEEE802.11i = IEEE802.1X/EAP + WEP (optional item) / TKIP / CCMP <br> <br> There is finally an encryption mode is WPA-PSK .(TKIP) + WPA2-PSK (AES), which is currently the highest wireless routing, encryption mode, current encryption mode because of the compatibility of doubt, it has not been used by many users. Currently the most widely used is WPA-PSK .(TKIP) and WPA2-PSK (AES) encryption modes. Believe in encrypted wireless network after, be sure to let our users ease of surfing. <br>.
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment