preview

Unit 7 Wpa2

Decent Essays

Wi-Fi Protected Access 2, the follow on security method to WPA for wireless networks that provides stronger data protection and network access control. It provides enterprise and consumer Wi-Fi users with a high level of assurance that only authorized users can access their wireless networks. Based on the IEEE 802.11i standard, WPA2 provides government grade security by implementing the National Institute of Standards and Technology (NIST) FIPS 140-2 compliant AES encryption algorithm and 802.1x-based authentication. WPA2 resolved vulnerabilities of WEP to “hacker attacks such as ‘man-in-the-middle’,
Authentication forging, replay, key collision, weak keys, packet forging, and ‘brute–force/dictionary’ attacks By using government grade AES …show more content…

The AES block cipher iterative encryption algorithm as implemented in WPA2 is considered to be so strong an encryption standard that the National Security Agency uses its 192-bit and 256-bit key lengths to encrypt Top Secret documents. For now and into the foreseeable future, the use of AES as implemented in WPA2 should be considered to be unbreakable. The WPA2-Enterprise mode provides the security needed for wireless networks in business environments. Though more complicated to set up, it offers individualized and centralized control over access to your Wi-Fi network. Users are assigned login credentials they must present when connecting to the network, which can be modified or revoked by administrators at any time. The authentication method used to verify the user (and server) credentials on WPA/WPA2-Enterprise networks is defined in the IEEE 802.1X standard. This requires an external server called a Remote Authentication Dial In User Service (RADIUS) or Authentication, Authorization, and Accounting (AAA) server, which is used for a variety of network protocols and environments including

Get Access