Wi-Fi Protected Access: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
No edit summary
m (Text replacement - "{{subpages}}" to "{{PropDel}}<br><br>{{subpages}}")
 
(2 intermediate revisions by one other user not shown)
Line 1: Line 1:
{{PropDel}}<br><br>{{subpages}}
'''Wi-Fi Protected Access''' or '''WPA''' is an [[encryption]] system used in later versions of the [[IEEE 802.11]] standard for [[wireless network]]ing. It replaces an earlier standard, [[Wired Equivalent Privacy]] or WEP, which is completely broken. There are different variants of WPA. The original WPA is now deprecated in favour of WPA2. WPA2 is required for full compliance with 820.11i.
'''Wi-Fi Protected Access''' or '''WPA''' is an [[encryption]] system used in later versions of the [[IEEE 802.11]] standard for [[wireless network]]ing. It replaces an earlier standard, [[Wired Equivalent Privacy]] or WEP, which is completely broken. There are different variants of WPA. The original WPA is now deprecated in favour of WPA2. WPA2 is required for full compliance with 820.11i.


Line 7: Line 8:
| url = http://dl.aircrack-ng.org/breakingwepandwpa.pdf}}</ref>
| url = http://dl.aircrack-ng.org/breakingwepandwpa.pdf}}</ref>


WPA2 is the current standard. It has two modes, Personal or PSK mode using a '''p'''re-'''s'''hared '''k'''ey and Enterprise mode which relies on an authentication server. PSK mode is vulnerable to a [[dictionary attack]] if a poor password is chosen. The [http://www.churchofwifi.org/ Church of WiFi] provide pre-computed tables to facilitate such attacks and there is at least one [http://www.wpacracker.com/faq.html commercial service] offering to retrieve keys.  
WPA2 is the current standard. It has two modes, Personal or PSK mode using a '''p'''re-'''s'''hared '''k'''ey and Enterprise mode which relies on an authentication server. PSK mode is vulnerable to a [[dictionary attack]] if a poor password is chosen. The [http://www.churchofwifi.org/ Church of WiFi] provide pre-computed tables to facilitate such attacks and there is at least one [http://www.wpacracker.com/faq.html commercial service] offering to retrieve keys and [http://www.zdnet.com/blog/hardware/elcomsoft-uses-nvidia-gpus-to-speed-up-wpawpa2-brute-force-attack/2724 another] offering software so you can do it yourself.  


== References ==
== References ==
{{reflist|2}}
{{reflist|2}}

Latest revision as of 04:48, 8 April 2024

This article may be deleted soon.
To oppose or discuss a nomination, please go to CZ:Proposed for deletion and follow the instructions.

For the monthly nomination lists, see
Category:Articles for deletion.


This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

Wi-Fi Protected Access or WPA is an encryption system used in later versions of the IEEE 802.11 standard for wireless networking. It replaces an earlier standard, Wired Equivalent Privacy or WEP, which is completely broken. There are different variants of WPA. The original WPA is now deprecated in favour of WPA2. WPA2 is required for full compliance with 820.11i.

There are also variants in the keying methods used. TKIP for Temporal Key Integrity Protocol was the original protocol in WPA, a stopgap required because WEP was broken; it can work on devices designed for WEP with only a firmware upgrade. Unfortunately, TKIP also has weaknesses [1] [2]

WPA2 is the current standard. It has two modes, Personal or PSK mode using a pre-shared key and Enterprise mode which relies on an authentication server. PSK mode is vulnerable to a dictionary attack if a poor password is chosen. The Church of WiFi provide pre-computed tables to facilitate such attacks and there is at least one commercial service offering to retrieve keys and another offering software so you can do it yourself.

References

  1. The Weakness of TKIP Encryption (2010-01-20). Retrieved on 2010-01-25.
  2. Martin Beck & Erik Tews, Practical attacks against WEP and WPA