![]() This replaces the cyclic redundancy check (CRC) that was used by the WEP standard. WPA also includes a Message Integrity Check, which is designed to prevent an attacker from altering and resending data packets. TKIP employs a per-packet key, meaning that it dynamically generates a new 128-bit key for each packet and thus prevents the types of attacks that compromised WEP. WEP used a 64-bit or 128-bit encryption key that must be manually entered on wireless access points and devices and does not change. The WPA protocol implements the Temporal Key Integrity Protocol (TKIP). However, since the changes required in the wireless access points (APs) were more extensive than those needed on the network cards, most pre-2003 APs could not be upgraded to support WPA. WPA could be implemented through firmware upgrades on wireless network interface cards designed for WEP that began shipping as far back as 1999. The Wi-Fi Alliance intended WPA as an intermediate measure to take the place of WEP pending the availability of the full IEEE 802.11i standard. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |