Wireless Encryption Proctocols, Relevant Information About Wireless Encryption Protocols & Standards
Auto Beauty Business Culture Dieting DIY Events Fashion Finance Food Freelancing Gardening Health Hobbies Home Internet Jobs Law Local Media Men's Health Mobile Nutrition Parenting Pets Pregnancy Products Psychology Real Estate Relationships Science Seniors Sports Technology Travel Wellness Women's Health

Wireless Encryption Proctocols, Relevant Information About Wireless Encryption Protocols & Standards

An explanation about wireless encryption standards. Also, how to implement these standards effectively and efficiently.

This is the most relevant information regarding Wireless Encryption Protocols and Standards.

Wireless Encryption Protocols.

WEP (Wired Equivalent Privacy): The first, original, and very easily to crack security standard.

  • WEP 40/128-bit key, the user key for WEP is usually either 40- or 128-bit, and usually has to be supplied as a hexadecimal string. ex. WEP 128-bit Passphrase:

Dynamic WEP (802.1x): A security algorithm for the 802.11 wireless networks. This standard was ratified in Sept. of 1999. The intention was to provide similar security to wired networks.

TKIP: Temporal Key Integrity Protocol. TKIP was the replacement for WEP. Several features were added to encrypt keys more securely than they were under WEP.

WPA: Wi-Fi Protected Access. The first version of WPA was intended to replace WEP, it was also called WPA1, is also linked with TKIP. TKIP works because it could be enforced on WEP hardware with a quick firmware upgrade.

WPA2:WPA2 implements the necessary elements of 802.11i, which includes AES and CCMP. As of March 2006, WPA2 certification is mandatory for all new devices to bear the Wi-Fi trademark. This advanced protocol will not work with some older network cards.

AES: Advanced Encryption Standard. AES replaced the old TKIP. AES is the most commonly used security standard. AES is implemented in WPA2/802.11i.

EAP: Extensible Authentication Protocol. EAP is framework based authentication used in wireless and Point-to-Point connections. EAP directs common functions and a negotiation mechanism; there are about forty different methods implemented for EAP.

802.11a/b/g/n; These amendments are not wireless encryption standards, but they define the bands and data rates for wireless networking. The amendments are part of the IEEE 802.11 specification.

LEAP: The Lightweight Extensible Authentication. This standard was developed by Cisco Systems as a proprietary wireless LAN authentication method. LEAP also uses Dynamic WEP keys and mutual authentication. LEAP may also be configured to use TKIP rather than Dynamic WEP.

WPA-PSK, WPA-Preshared Key: Meaning one manually set key, that is always manually managed. Alphanumeric characters and symbols are used to create a passphrase. Scalability: Home and small office networks.

RADIUS: Remote Authentication Dial In User Service. It’s only uses are authentication and authorization management. A remote RADIUS server is used to perform these functions.

CCMP: Counter Mode with Cipher Block Chaining Message Authentication Code Protocol. This protocol was designed for products that implement the 802.11i standard. It enhances the data cryptographic encapsulation mechanism that AES designed for data confidentiality. Its creation also addressed the issues presented by, TKIP, WPA1, and WEP. (Very insecure)

802.11i: This standard specifies security mechanisms for 802.11 networks. It is an amendment to the original IEEE 802.11 standard. The Wi-Fi Alliance implemented their approved, interoperable implementation of the full 802.11i as WPA2. It was also called RSN (Robust Security Network). This standard supersedes the previous security specifications.

Consumer tip: Get discounts on leading internet access brands by exploring the latest discount codes for internet access. Utilize community-sourced coupons, promo codes, and in-store offers using our partner websites.
Need an answer?
Get insightful answers from community-recommended
in Wifi & Wireless on Knoji.
Would you recommend this author as an expert in Wifi & Wireless?
You have 0 recommendations remaining to grant today.
Comments (1)

Very nice piece of work.