Wi-Fi Protected Access: Difference between revisions
imported>Sandy Harris No edit summary |
John Leach (talk | contribs) m (Text replacement - "{{subpages}}" to "{{PropDel}}<br><br>{{subpages}}") |
||
(3 intermediate revisions by one other user not shown) | |||
Line 1: | Line 1: | ||
{{PropDel}}<br><br>{{subpages}} | |||
'''Wi-Fi Protected Access''' or '''WPA''' is an [[encryption]] system used in later versions of the [[IEEE 802.11]] standard for [[wireless network]]ing. It replaces an earlier standard, [[Wired Equivalent Privacy]] or WEP, which is completely broken. There are different variants of WPA. The original WPA is now deprecated in favour of WPA2. WPA2 is required for full compliance with 820.11i. | '''Wi-Fi Protected Access''' or '''WPA''' is an [[encryption]] system used in later versions of the [[IEEE 802.11]] standard for [[wireless network]]ing. It replaces an earlier standard, [[Wired Equivalent Privacy]] or WEP, which is completely broken. There are different variants of WPA. The original WPA is now deprecated in favour of WPA2. WPA2 is required for full compliance with 820.11i. | ||
There are also variants in the keying methods used. TKIP for Temporal Key Integrity Protocol was the original protocol in WPA, a stopgap required because WEP was broken; it can work on devices designed for WEP with only a firmware upgrade. Unfortunately, TKIP also has weaknesses <ref>{{cite web |url=http://blogs.iium.edu.my/jaiz/2010/01/20/the-weakness-of-tkip-encryption/ |date=2010-01-20 |accessdate=2010-01-25| title=The Weakness of TKIP Encryption}}</ref> <ref> | There are also variants in the keying methods used. TKIP for Temporal Key Integrity Protocol was the original protocol in WPA, a stopgap required because WEP was broken; it can work on devices designed for WEP with only a firmware upgrade. Unfortunately, TKIP also has weaknesses <ref>{{cite web |url=http://blogs.iium.edu.my/jaiz/2010/01/20/the-weakness-of-tkip-encryption/ |date=2010-01-20 |accessdate=2010-01-25| title=The Weakness of TKIP Encryption}}</ref> | ||
| | <ref>{{ citation | ||
| author = Martin Beck & Erik Tews | |||
| title = Practical attacks against WEP and WPA | | title = Practical attacks against WEP and WPA | ||
| url = http://dl.aircrack-ng.org/breakingwepandwpa.pdf</ref> | | url = http://dl.aircrack-ng.org/breakingwepandwpa.pdf}}</ref> | ||
WPA2 is the current standard. It has two modes, Personal or PSK mode using a '''p'''re-'''s'''hared '''k'''ey and Enterprise mode which relies on an authentication server. PSK mode is vulnerable to a [[dictionary attack]] if a poor password is chosen. The [http://www.churchofwifi.org/ Church of WiFi] provide pre-computed tables to facilitate such attacks and there is at least one [http://www.wpacracker.com/faq.html commercial service] offering to retrieve keys. | WPA2 is the current standard. It has two modes, Personal or PSK mode using a '''p'''re-'''s'''hared '''k'''ey and Enterprise mode which relies on an authentication server. PSK mode is vulnerable to a [[dictionary attack]] if a poor password is chosen. The [http://www.churchofwifi.org/ Church of WiFi] provide pre-computed tables to facilitate such attacks and there is at least one [http://www.wpacracker.com/faq.html commercial service] offering to retrieve keys and [http://www.zdnet.com/blog/hardware/elcomsoft-uses-nvidia-gpus-to-speed-up-wpawpa2-brute-force-attack/2724 another] offering software so you can do it yourself. | ||
== References == | == References == | ||
{{reflist|2}} | {{reflist|2}} |
Latest revision as of 04:48, 8 April 2024
This article may be deleted soon. | ||
---|---|---|
Wi-Fi Protected Access or WPA is an encryption system used in later versions of the IEEE 802.11 standard for wireless networking. It replaces an earlier standard, Wired Equivalent Privacy or WEP, which is completely broken. There are different variants of WPA. The original WPA is now deprecated in favour of WPA2. WPA2 is required for full compliance with 820.11i. There are also variants in the keying methods used. TKIP for Temporal Key Integrity Protocol was the original protocol in WPA, a stopgap required because WEP was broken; it can work on devices designed for WEP with only a firmware upgrade. Unfortunately, TKIP also has weaknesses [1] [2] WPA2 is the current standard. It has two modes, Personal or PSK mode using a pre-shared key and Enterprise mode which relies on an authentication server. PSK mode is vulnerable to a dictionary attack if a poor password is chosen. The Church of WiFi provide pre-computed tables to facilitate such attacks and there is at least one commercial service offering to retrieve keys and another offering software so you can do it yourself. References
|