Introduction to WPA Wireless encryption

Source: Internet
Author: User

The WPA full name is Wi-Fi Protected Access, with WPA and WPA2 two standards, a system that protects wireless computer network (Wi-Fi) security, and is a result of several serious weaknesses found in the previous generation of system Wired equivalent encryption (WEP). WPA is the majority of the IEEE 802.11i Standard and is a transitional solution that replaces WEP before 802.11i is complete. WPA is designed to be used on all wireless cards, but may not be used in the first generation of wireless access points. WPA2 is a complete standard, but it cannot be used on some old network cards. Both provide excellent security, but there are two obvious problems:

WPA or WPA2 must be started and selected to replace WEP, but most installation guidelines make WEP the first choice.

When using the "personal" mode most likely to be used in both home and small offices, the password required to preserve integrity is longer than the six to eight characters that have been taught to the user.

English abbreviation: WPA (Wi-Fi Protected Access)

Wi-Fi network security access

Category: Mobile and wireless

Explanation: WPA is a standards-based, interoperable WLAN security enhancement solution that greatly enhances the level of data protection and access control for existing and future wireless LAN systems. WPA is derived from the ieee802.11i standard being developed and will be maintained forward compatible. When deployed properly, WPA guarantees that data for WLAN users is protected and that only authorized network users can access the WLAN network.

Because WEP has proven to be unsafe, WPA provides a temporary solution to users before the 802.11i protocol is complete. The standard data encryption using the TKIP protocol (temporary key Integrity Protocol), authentication has two modes to choose from, one is to use the 802.1X protocol authentication; One is known as preshared key PSK (pre-shared key) mode.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.