You are on page 1of 8

30/11/12

WPA and WPA2 (Wi-Fi security tutorial - part 2)

All
Home

Finance & Business

Technologies (IT & IS)

Other

Site map

Directory

FORUM

WPA and WPA2 (Wi-Fi security tutorial - part 2)


WPA and WPA2 (Wi-Fi security tutorial - part 2)
Ads by Google

Maxi-Pedia
Advertise on Maxi-Pedia
Network Security

Wireless Security

Wireless LAN

Search Maxi-Pedia
Custom search

WPA (or Wi-Fi Protected Access) is today the security standard in wireless networking that is rapidly replacing the older WEP (Wired Equivalency Privacy) standard. WPA and its younger sibling WPA2 are newer standards based on the IEEE 802.11i ratified amendment set out to improve some of the disadvantages of WEP. This wireless security standard is playing today a vital role in the security of wireless networks.

Search

Interesting Topics
IPSec, VPN, architecture (wireless security tutorial part 3) Pathping IEEE Wireless Wi-Fi networking 802.11 standards Difference between shared folder and DFS root Tracert Server Net Commands Grid computing - distributed computing
1/8

. .

This tutorial is a continuation from the first page: Wireless Wi-Fi network security tutorial 101 (part 1)

WPA Wi-Fi Protected Access (WPA & WPA2)


WPA builds upon WEP, making it more secure by adding extra security algorithms and mechanisms to fight intrusion. Perhaps the most

www.maxi-pedia.com/WPA+WPA2+WiFi+protected+access

30/11/12

WPA and WPA2 (Wi-Fi security tutorial - part 2)

important improvement over WEP is a dynamic security key exchange mechanism and much more improved authentication and encryption mechanisms.
WPA-802.1x and WPA-PSK

NET SEND command System error 67 has occurred NET USE command

Wireless Crane Scales


Wireless Weighing Systems for Cranes. Get More Info Now!
www.LoadSystems.com

Related Topics
IPSec, VPN, architecture (wireless security tutorial part 3) IPSec, VPN, and wireless architecture are the words that take wireless network security to the next ... How to set up and configure WPA-PSK in Windows? Setting up and configuring WPA security depends on the scale of your network and the robustness of s ... Wireless Wi-Fi network security tutorial 101 (part 1) Even though wireless or Wi-Fi network security is the bread and butter of today's IT Wi-Fi infrastru ... Secure your WLAN (wireless security tutorial - part 4) Implementing the proper wireless security standard, devising a sound wireless architecture plan, an ... How to break MAC filtering (wifi security) How to break MAC filtering

WPA comes in two flavors, that is WPA802.1x and WPA-PSK. WPA-802.1x is a good choice for large businesses because it combines access point authentication with another layer of authentication through external authentication services. This means that after the authenticating user associates with the wireless access point, his or her credentials are also checked against a locally stored database or even external sources (for example RADIUS or Kerberos). Authentication servers also distribute security keys to individual users dynamically. WPA-PSK on the other hand is a solution for small businesses and homes which utilizes so-called Pre-Shared Key (PSK) which is technically (from the user perspective) similar to how security keys with WEP are implemented but in a more secure way (more about this in the TKIP section below). The following table compares WPA-802.1x, WPA-PSK, and WEP in their suitability for large corporations or home and small business use:

www.maxi-pedia.com/WPA+WPA2+WiFi+protected+access

2/8

30/11/12

WPA and WPA2 (Wi-Fi security tutorial - part 2)

was probably the first question that followed the invention of the MAC fi ...

Favorite Topic
Word letter mixer (disorganizer) Word letter mixer (disorganizer) is a nice tool that takes each word from the form and distorts or disorganizes its content. The word letter mixer (disorganizer) leaves the first and the last letter in place and shuffles all other letters within the word. This word letter shuffler can be used to create "semi-encoded" text that is still readable ...

Now let's take a look at the difference between WPA and WPA2.
WPA and WPA2

WAP is also better than WEP in its data encryption abilities. While WEP uses the same static security key for both encryption and decryption of all communication (the key never expires), WPA implements a mechanism involving a number of security keys. This is done through so-called Temporal Key Integrity Protocol (TKIP). This is a revolutionary improvement because even if the intrusor obtains one security key, he will not be able to use it for long. This system changes the security key used for data transmission every specified amount of time to prevent cracking attempts. When we talk about security keys, we implicitly talk about a working mechanism of security keys. The TKIP mechanism shares a starting key between devices, but each device then changes its encryption key for the ongoing communication. First, initial authentication is done using the Pre-Shared Key set in the wireless configuration (the key that is set at the access point and then distributed by the admin to clients). So far, the concept of WPA is the same like in WEP. However, once the initial authentication is completed, then another so-called Master Key is generated which is bound to the particular session between the access point and the client. The Master Key is then further split into so-called Group Transient Key
www.maxi-pedia.com/WPA+WPA2+WiFi+protected+access

More Details

3/8

30/11/12

WPA and WPA2 (Wi-Fi security tutorial - part 2)

which secures multicast and broadcast messages sent by the access point to the clients, and to another security key called Pairwise Transient Key which secures the unicast messages sent from wireless clients to the access point. Some wireless routers provide a function allowing the administrator to control how often the Group Transient Key is changed by the access point. As you can see, this mechanism is principially quite hard to crack because even if the attacker captures some security key from the data flow, it is limited to a single session and can even expire within that session as well. E n c r y p t i o na l g o r i t h ma n ds e c u r i t yf u n d a m e n t a l s WPA employs the RC4 encryption mechanism which is the same like WEP, but WPA uses a longer security key, 128 bit in length (compared to 104 bit in WEP) and longer initialization vector, 48 bit in length (compared to 24 bit in WEP). This gives WPA more strength compared to WEP because a hacker would need to capture significantly more data packets in case of WPA when trying to perform so-called statistical attack. D a t ai n t e g r i t yc o n t r o l WPA also provides better data integrity control when compared to WEP. This prevents hackers from capturing existing data packets, modifying them, and then re-sending to the access point. In simple words, WPA includes a mechanism to determine whether a received packet has already been sent or not. E n c r y p t i o na l g o r i t h m si nW P A 2 WPA2 compliments TKIP and the improved data integrity control
www.maxi-pedia.com/WPA+WPA2+WiFi+protected+access

Searching for pairwise transient key Natural Cholesterol Cure


Lowe r your chole ste rol to he althy le ve ls fast. NO DR UGS. Find out how

c ardios avior.c om/G uaranteed

Find And A Keys at Gre at Price s.


www.P ronto.c om

And A Key

www.O nlines Bankings A c c ount.c om

Fre e O nline C he ck ing, Savings, Bill Pay & More . Signup Today.

Key.com

C hoose a C re dit C ard That's R ight You. Ge t Top Info At


www.C reditC ardForY ou.net

Key Bank Mastercard

Find Fl Key Phone Num be rs, Addre sse s & Maps.


www.L oc alG uides .c om

Fl key

C hitik a | O pt out?

Selected Topics
Traveling to Europe? You might need Schengen visa
4/8

30/11/12

WPA and WPA2 (Wi-Fi security tutorial - part 2)

algorithm with more secured encryption mechanism called Advanced Encryption Standard (AES) - Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP). In other words, this means an improved encryption algorithm. Experts say that AES-CCMP is robust enough to be used for government data security purposes.

might need Schengen visa How to find a job? Awesome jokes about economic crisis Why gas prices are so low?

What are the disadvantages of WPA?


The disadvantage of WPA is that older wireless access points may need to have their firmware updated. Wireless clients' software also may need to be upgraded. For example, clients based on Windows XP effectively require either Service Pack 2 and some patches or the addition of the WPA client to their wireless configuration. If the AES algorithm is your choice, then know that it requires special hardware support, so a firmware/driver update on an older router does not get AES to work. AES requires AES-enabled hardware. Even with simple WPA, encryption and decryption is slower for devices using software rather than dedicated WPA hardware support. WPA-802.1x together with RADIUS is more complicated to set up than an average home user is willing to do. WPA2 is known to cause significant CPU overhead because the AES cryptographic algorithm is simply more resources demanding than the RC4 algorithm. In any case, since WPA adds to the packet size, transmission takes longer.

Maxi RSS Feeds


Subscribe to Maxi-Pedia and receive notifications about new articles in email.

How can I implement WPA in my network?


You can find more about this on the next page: How to set up and configure WPA-PSK in Windows?
www.maxi-pedia.com/WPA+WPA2+WiFi+protected+access 5/8

How else can I improve my security?


Wireless network security does not stop with the selection of the best standard. There are many other security steps that can be taken to further improve your network. See the third part of this tutorial: IPSec, VPN, architecture (wireless security tutorial - part 3)

Is WPA backwards compatible with WEP?


Yes, a wireless access point that is set up to use primarily WPA still can authenticate WEP clients at the same time. During the association, the access point determines which clients use WEP and which clients use WPA and behaves accordingly. However, supporting a mixture of WEP and WPA clients is problematic; therefore, it is suggested all clients are upgraded to WPA once it is determined that WPA security should be implemented at the access point.

Where can I find more details about WPA and WPA?


We suggest visiting the following link: h t t p : / / t l d p . o r g / H O W T O / 8 0 2 1 X H O W T O / i n d e x . h t m l

I have questions about WPA


In case you have any questions about WPA or WPA2, or wireless security in general, you are welcome to post your questions in our security discussion forum. Link to the first page of this tutorial: Wireless Wi-Fi network security tutorial 101 (part 1) Link to the third page of this tutorial: IPSec, VPN, architecture (wireless security tutorial - part 3) Link to the fourth page of this tutorial: Secure your WLAN (wireless

30/11/12

WPA and WPA2 (Wi-Fi security tutorial - part 2)

security tutorial - part 4)


.

IT

Networking

Security

Searching for pairwise transient key? 1. And A Key 2. Natural Cholesterol Cure
Find And A Keys at Great Prices.
www.Pronto.com

Lower your cholesterol to healthy levels fast. NO DRUGS. Find out how cardiosavior.com/Guaranteed

3.

C hitik a | O pt out?

Discuss this article or this topic in our discussion forum:


(The table bellow shows a list of 8 most recent topics posted in our discussion forum. Visit our discussion forum to see more. It is possible the links below are not related to this page, but you can be certain you will find related posts in the discussion forum. You can post one yourself too.)
Sche nge n visa for Alge rian with re side nce card of fam ily m e m be r of EEA national by sam ir87 i have ove rstay sche nge n visa by 3 ye ars !!! by apapunas m arrie d to slove nian by ste ve n Q ue stion about 90/180 rule by danisara Sche nge n visa re fusals: The Appe al Proce ss is a Sham by Sche nge nJustice R e fusal Le tte r of Sche nge n Visa by Sche nge nJustice
November 28, 2012, 10:56:12 am November 28, 2012, 09:25:26 am November 28, 2012, 09:13:36 am November 28, 2012, 09:10:32 am October 31, 2012, 09:36:11 am October 19, 2012, 02:28:04 pm

Email this article to a friend:


TO: FROM: your email here Send
.

2+6-3=

www.maxi-pedia.com/WPA+WPA2+WiFi+protected+access

7/8

30/11/12

WPA and WPA2 (Wi-Fi security tutorial - part 2)

How can I link to this web page?


It is easy, just include the code provided below into your HTML code. <a href="http://www.maxipedia.com/WPA+WPA2+WiFi+protected+access" title="www.MaxiPedia.com: WPA and WPA2 (Wi-Fi security tutorial - part 2)" target="_blank">WPA and WPA2 (Wi-Fi security tutorial - part 2)</a>

Bookmark this article with


Delicious Digg StumbleUpon Furl Facebook Google Yahoo Make sure that you get our latest posts delivered to you by subscribing via your favorite feed reader .

Copyright 2012 Maxi-Pedia http://www.Maxi-Pedia.com Reproduction without written permission from Maxi-Pedia is prohibited. All articles are protected by copyright and have been archived at a national library. Linking to Maxi-Pedia pages is permitted provided that the links are clearly acknowledged. Thank you.
http://www.Maxi-Pedia.com - Copyright 2012 - Contact information - Advertise - Terms of Use & Disclaimers

You might also like