Tuesday, February 22, 2011
【 Weak current College 】 wireless encryption of several encryption methods
In the current wireless router with encryption mode: WEP, WPA-PSK (TKIP), WPA2-PSK (AES) and WPA-PSK (TKIP) + WPA2-PSK (AES).
WEP (wired equivalent privacy)
WEP is WiredEquivalentPrivacy abbreviation as defined in the 802 .11b standard for wireless local area network (WLAN) security protocols. WEP is used to provide and wired lan at the same level of security. LAN born than WLAN security, because LAN physical structure to be protected, some or all of the network in a building which also prevents unauthorized access.
Through radio waves of WLAN is not the same physical structure and therefore vulnerable to attack, interference. WEP goal is through radio waves in the data encryption to provide security, like end-to-end delivery. WEP characteristics using the rsa data security, developed by rc4prng algorithm. If your wireless base station support MAC filtering, it is recommended that you use this together with WEP characteristics (MAC filtering is much more than encryption security).
Although the name point of view seems to be a wired network security options, in fact, this is not the case. WEP standard early in the wireless network has been created, the goal is to become a wireless local area network WLAN security protection layer of the necessary, but WEP's performance is very disappointing. Its roots lie in the design deficiencies.
In a system using WEP, wireless network transmission of data is to use a random key for encryption. However, the WEP key used to generate these methods will soon be found predictable, so for potential intruders who can easily intercept and decipher these keys. Even a medium technical level of the wireless hackers can in two to three minutes of cracking WEP encryption quickly.
IEEE802.11 dynamic wired equivalent privacy (WEP) mode is the twentieth-century design in the late 1990s, when the powerful encryption technology as an effective weapon to be United States strict export restrictions. Fear of a strong encryption algorithm to be cracked, wireless networking products have been export is prohibited. However, only two years later, the dynamic wired equivalent privacy mode was discovered there are serious shortcomings. But the 1990s errors should not be when the wireless network security or IEEE802.11 standard itself, the wireless networking industry can't wait for the electrical and electronics engineers revised standards, so they launched a dynamic key integrity Protocol TKIP (dynamic wired equivalent privacy patch version).
Although WEP has proven to be outdated and inefficient, but today in many modern wireless access points and wireless router, it is still supported encryption modes. Moreover, it remains to be personal or company use up one of the encryption method. If you are using WEP encryption, if you are on your network's security very seriously, then later as much as possible not to use WEP, because that really is not very secure.
WPA-PSK(TKIP)
Wireless network security mechanism was originally used was WEP (wired equivalent privacy), but later discovered that WEP is very insecure, 802.11 organizations began to develop a new security standard, which is later 802.11i Protocol. But standards to finally release takes a long time, but considering that consumers would not be to network security and discard the original wireless devices, Wi-Fi Alliance in standard launched before 802.11i on the basis of the draft, developed a technique called WPA (Wi-FiProctedAccess) security mechanisms, it uses TKIP (temporal key integrity Protocol), it uses the encryption algorithm or WEP encryption algorithm used in RC4, it is not necessary to modify the original wireless device hardware, WPA for WEP problems: IV too short, key management, too simple, no valid for message integrity protection, through a software upgrade method to improve network security.
The emergence of WPA give the user a complete authentication mechanisms, AP results based on the user's certificate to decide whether to grant it access to a wireless network; certification success can multiple ways (the number of packets transmitted, the user access to network time, etc.) to dynamically change each access the user's encryption key. In addition, for users in the wireless transmission of packets in the MIC code, ensure that user data is not changed by another user. As a subset of the 802 .11i standard, WPA core is IEEE802.1x and TKIP (TemporalKeyIntegrityProtocol).
WPA considering different users and different application security needs, for example: business users want a high security protection (Enterprise), or it may reveal very important trade secrets; and home users tend to just use the Internet to browse the Internet, send and receive E-mail, print and share files, the user's security requirements are relatively low. In order to meet the different needs of the users of safety requirements, the WPA provided two application models: enterprise mode, family (including small office).
According to these two different application modes, WPA authentication also there are two different ways. For large enterprise applications, often using "802.1x + EAP" means that the user provides the authentication credentials required. But for some small and medium business network or home user, WPA also offers a simplified model, it does not require a specialized certification server. This mode is called "WPA pre-shared key (WPA-PSK)", it only requires that each WLAN node (AP, wireless routers, network cards, etc.), enter a key in advance.
This key is only used to the certification process, and not used to transmit data encryption。 Data encryption key is generated dynamically after the authentication is successful, the system will ensure "a a dense," does not exist like WEP so the whole network share a single encryption key, so greatly improves system security.
WPA2-PSK(AES)
After promulgation in 802.11i, Wi-Fi Alliance has launched the WPA2, it supports AES (advanced encryption algorithm), so it requires new hardware support, it uses the CCMP (counter mode cipher-block chaining message integrity code agreement). The WPA/WPA2, PTK build dependent PMK, PMK is in two ways, one is a form of PSK is a preshared key, in this way in PMK = PSK, and another, requires authentication server and site for consultations to produce the PMK.
IEEE802.11 is developed by the technical standards, Wi-Fi Alliance which is the commercial standards, developed by Wi-Fi commercialized standard basically also complies with the IEEE technical standard developed by. WPA (Wi-FiProtectedAccess) in fact is made by the Wi-Fi Alliance's security standards, the commercial purpose of standards is to support this technology-IEEE802.11i oriented security standards. The WPA WPA2 is actually the second version. WPA is will be two versions of the reasons is that Wi-Fi Alliance of commercial operation.
We know that the task force established 802.11i's purpose is to build a more secure wireless LAN, so the code for the encryption project in two new security encryption agreement – TKIP and CCMP (some wireless network devices to AES, Word to replace AES-CCMP CCMP). With TKIP although weakness for WEP, made a significant improvement, but retained the RC4 algorithm and a basic schema, implying that there also TKIP RC4 itself implies weakness. Thus creating a whole new 802.11i longer, stronger security, better suited for applications in wireless LAN environment agreements-CCMP encryption. So before the CCMP, TKIP is ready has been completed.
But to wait until the CCMP, then publish the complete IEEE802.11i standard, you may still take some time, but Wi-Fi Alliance in order to make the new security standards can be deployed as soon as possible, to remove users on wireless LAN security concerns, thereby allowing wireless LAN market can be quickly extended out, thus using TKIP for IEEE802.11i completed the third edition of the draft (IEEE802.11idraft3) asa benchmark in the WPA. The IEEE is complete and publish IEEE802.11i wireless LAN security standards, Wi-Fi Alliance also immediately released the WPA version 2 (WPA2).
WPA = IEEE802.11idraft3 = IEEE802.1X/EAP + WEP (optional item)/TKIP
WPA2 = IEEE802.11i = IEEE802.1X/EAP + WEP (optional item)/TKIP/CCMP
There is finally an encryption mode is WPA-PSK (TKIP) + WPA2-PSK (AES), which is currently the highest wireless routing, encryption mode, current encryption mode because of compatibility problems that have not been used by many users. Currently the most widely used is WPA-PSK (TKIP) and WPA2-PSK (AES) encryption modes. Believe in encrypted wireless network after, be sure to let our users ease of surfing.
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment