Information Technology Reference
In-Depth Information
What to do? Wi-Fi Alliance has proposed a new standard security called
Wi-Fi protected access (WPA) [DOORS] intended to replace the WEP in a
short time. The new security protocol uses cryptographic algorithms and
more robust authentication systems. It is capable to operate with current
certified Wi-Fi products, and it is compatible with products already available
on the market. And, most importantly, is able to resist to all types of attacks
known so far. The WPA is based on a subset of features that are illustrated in
specifications known as 802.11i Robust Security Network. WPA is able to
run on all existing 802.11b hardware in the form of software update and will
be able to ensure that data is protected and that only authorized people/
systems can access the network.
The everyday reality will be the test for this new security protocol. From a
more technical point of view, the new WPA uses mechanisms of the future
802.11i standard for both data protection and for the process of users
authentication. For data encryption, WPA uses Temporal Key Integrity Protocol
(TKIP), which uses the same algorithm of WEP, but builds the keys in a different
and more secure manner. With WPA each user has its own encryption key
and this key can be changed periodically (dynamic keys and then no more static).
In corporate networks, the authentication process will be managed by a
specific server capable to control WEP users in a simpler manner. For small
house networks, with fewer demands in terms of safety, it is used a 'pre-
shared key' modality, which has the advantage of not requiring the use of a
server, even if the level of security is certainly lower.
The 802.11i standard will include two other types of cryptography: the
Wireless Robust Authenticated Protocol (WRAP) and Counter with Cipher
Block Chaining Message Authentication Code Protocol (CCMP) [GATES],
which should bring the wireless network security to an optimal level.
As we know absolute security virtually does not exist, but it is certain
that these passages of the Wi-Fi Alliance go in the right direction. Only
when companies, organizations and home users will feel confident enough,
wireless networks can definitely takeoff.
3
Encryption
The growing use of Internet as a medium for a rapid exchange of informa-
tion, emphasized the need for secure, private and protected transmission of
data from indiscreet glances.
Unfortunately, the network, as designed, does not support a good level of
security and privacy. Information is transmitted in clear and it could be
intercepted and read by anyone. Therefore, it has been necessary to create
methods that make information indecipherable, ensuring therefore the
 
 
Search WWH ::




Custom Search