Wi-Fi Protected Access

From Citizendium
Jump to navigation Jump to search
This article may be deleted soon.
To oppose or discuss a nomination, please go to CZ:Proposed for deletion and follow the instructions.

For the monthly nomination lists, see
Category:Articles for deletion.


This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

Wi-Fi Protected Access or WPA is an encryption system used in later versions of the IEEE 802.11 standard for wireless networking. It replaces an earlier standard, Wired Equivalent Privacy or WEP, which is completely broken. There are different variants of WPA. The original WPA is now deprecated in favour of WPA2. WPA2 is required for full compliance with 820.11i.

There are also variants in the keying methods used. TKIP for Temporal Key Integrity Protocol was the original protocol in WPA, a stopgap required because WEP was broken; it can work on devices designed for WEP with only a firmware upgrade. Unfortunately, TKIP also has weaknesses [1] [2]

WPA2 is the current standard. It has two modes, Personal or PSK mode using a pre-shared key and Enterprise mode which relies on an authentication server. PSK mode is vulnerable to a dictionary attack if a poor password is chosen. The Church of WiFi provide pre-computed tables to facilitate such attacks and there is at least one commercial service offering to retrieve keys and another offering software so you can do it yourself.

References

  1. The Weakness of TKIP Encryption (2010-01-20). Retrieved on 2010-01-25.
  2. Martin Beck & Erik Tews, Practical attacks against WEP and WPA