Description of security specification for three-point wireless WLAN

Source: Internet
Author: User
Tags reset

What does the wireless WLAN security specification include? Let's give you a detailed introduction here. First of all, we need to know the wireless WLAN security specification, roughly three kinds, respectively, are WEP, WPA and WAPI. So for each of us to see the specific content of it.

Wireless WLAN Security Specification 1:WEP

WEP (wiredequivalentprivacy) is the security standard used in 802.11B to provide an encryption mechanism to secure the data link layer, so that the wireless network WLAN data is secured to the same level as the wired LAN. WEP uses the RC4 algorithm to achieve symmetric encryption. A secret key is shared between the AP and the wireless network card by preset. When communicating, the WEP standard requires the transport program to create a packet-specific initialization vector (IV) that combines it with a preset key to generate an encryption key for packet encryption. The receiving program receives this initialization vector and combines it with the local preset key to recover the encryption key.

WEP allows a 40bit long key, which is too short for most applications. Also, WEP does not support automatic replacement of keys, and all keys must be manually reset, which results in long-term reuse of the same key. Third, although the initialization vector is used, the initialization vector is passed in clear text and is allowed to be reused within 5 hours, which has no effect on strengthening the key strength. In addition, the RC4 algorithm used in WEP has proved to be a vulnerability. In summary, the limitation of key setting and the insufficiency of the algorithm itself make WEP have obvious security flaw, and the security effect that WEP provides can only be defined as "better than nothing".

Wireless WLAN Security Specification 2:WPA

WPA (wi-fiprotectedaccess) is a device that protects Wi-Fi login security. It is divided into two versions of WPA and WPA2 and is an upgraded version of WEP to compensate for several disadvantages of WEP. is part of the 802.11i, a temporary replacement version of 802.11i before 802.11i is complete.

Unlike WEP,WPA, which provides encryption and authentication at the same time. It guarantees the security of the data link layer, while ensuring that only authorized users can access the wireless network WLAN. WPA uses the TKIP Protocol (TEMPORALKEYINTEGRITYPROTOCOL) as the encryption protocol, which provides a key reset mechanism and enhances the effective length of the key, which makes up for the deficiencies of the WEP protocol. There are two methods for authentication, one is using 802.11x protocol, the other is using preset key PSK.

Wireless WLAN Security Specification 3:wapi

WAPI (Wireless network wlanauthenticationandprivacyinfrastructure) is a self-developed and vigorously implemented wireless WLAN security specification, which through the IEEE (note, not Wi-Fi) certification and authorization, is an authentication and privacy protection protocol that acts like WEP in 802.11b, but provides better security protection. WAPI uses asymmetric (elliptic curve cipher) and symmetric cipher system (block cipher) to realize security protection, which realizes the authentication of equipment, link authentication, access control and the encryption of user information in wireless transmission state.

In addition to realizing the mutual authentication between mobile terminals and AP, WAPI can also realize the authentication of mobile terminals and AP in mobile networks. At the same time, the verification of AP and mobile terminal certificates is given as complete, which reduces the consumption of the MT and AP, and on the other hand provides the possibility for the MT and AP to use the public key certificates issued by different issuers.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.