- 1、本文档共39页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
WPA [教程]
Wi-Fi Protected Access WPA What is WPA? Wi-Fi Protected Access (WPA) is a response by the WLAN industry to offer an immediate, a stronger security solution than WEP. WPA is intended to be: A software/firmware upgrade to existing access points and NICs. Inexpensive in terms of time and cost to implement. Compatible with vendors. Suitable for enterprise, small sites, home networks. Runs in enterprise mode or pre-shared key (PSK) mode History of WPA WPA was created by the Wi-Fi Alliance, an industry trade group, which owns the trademark to the Wi-Fi name and certifies devices that carry that name. WPA is designed for use with an IEEE 802.1X authentication server, which distributes different keys to each user. History of WPA The Wi-Fi Alliance created WPA to enable introduction of standard-based secure wireless network products prior to the IEEE 802.11i group finishing its work. The Wi-Fi Alliance at the time already anticipated the WPA2 certification based on the final draft of the IEEE 802.11i standard. History of WPA Data is encrypted using the RC4 stream cipher, with a 128-bit key and a 48-bit initialization vector (IV). One major improvement in WPA over WEP is the Temporal Key Integrity Protocol (TKIP), which dynamically changes keys as the system is used. When combined with the much larger IV, this defeats the well-known key recovery attacks on WEP. History of WPA In addition to authentication and encryption, WPA also provides vastly improved payload integrity. The cyclic redundancy check (CRC) used in WEP is inherently insecure; it is possible to alter the payload and update the message CRC without knowing the WEP key. History of WPA A more secure message authentication code (usually known as a MAC, but here termed a MIC for Message Integrity Code) is used in WPA, an algorithm named Michael. The MIC used in WPA includes a frame counter, which prevents replay attacks being executed. History of WPA By increasing the size of the keys and I
您可能关注的文档
- University English speech(PPT show), I want to have a Lamborghini.ppt
- US Oncology 9735 研究详解.ppt
- USB3.0物理及电气特性.pptx
- USANA快速起步(行动圈).ppt
- Using HDF5 in MATLAB [教程].ppt
- USSD社保通2.ppt
- UT淡出TOFD粉墨登场(PPT-23).ppt
- UV-4802 使用说明.ppt
- uw7-07安装磁带和cd-ROM设备.ppt
- UZZ大陆事业群workshop(吕鸿德).ppt
- 河南洛阳市栾川县鑫宝矿业有限公司招聘笔试题库2024.pdf
- 江苏连云港市东海县粮食购销总公司招聘笔试题库2024.pdf
- 防洪施工投标方案技术标.docx
- incting with the desktop nanoboard nb2dsk01ap0156与桌面纳米板连接.pdf
- 剑桥国际考试普通教育证书高级辅助水平化学9701 level真题试题.pdf
- 二批多彩投下监播报告.pdf
- 肤色慢性病的诊断和治疗方法.pptx
- script authoring quick reference脚本创作快速参考.pptx
- 2022-2023学年浙江省杭州市萧山区城北片初三二模冲刺四生物试题含解析.pdf
- 2023年部编五四制中考语文二轮复习作文之半命题作文(原卷版+解析)(上海专用).pdf
文档评论(0)