Saturday, March 16, 2019
Essay --
SolutionWPA2 Wi-Fi Protected Access 2 (WPA2) based on the IEEE 802.11i standard is an improvement to the 802.11 standard that specifying security mechanisms for receiving set networks. On June 24th, 2004, this standard been uses to replaces the previous security specifications, Wired Equivalent concealment (WEP), which was shown to have severe security weaknesses. Wi-Fi Protected Access (WPA) had previously been introduced as a solution to WEP insecurities. WPA implemented only a subset of IEEE 802.11i. WPA2 makes use of a specific mode of the Advanced Encryption mensuration (AES) known as the Counter Mode Cipher Block Chaining-Message Authentication Code (CBC-MAC) communications protocol (CCMP). CCMP provides both data confidentiality (encryption) and data integrity. The use of the Advanced Encryption Standard (AES) is a to a greater extent secure alternative to the RC4 stream cipher use by WEP and WPA.802.11 Security solutionWEPWPAWPA2CipherRC4RC4AES advert Size40 bits128 bits e ncryption 64 bits authentication128 bitsIV Size24 bits48 bits48 bitsData IntegrityCRC-32MichaelCCMHeader IntegrityNoneMichaelCCM instant replay AttackNoneIV SequenceIV SequenceKey ManagementNoneEAP-BasedEAP-BasedWPA2 AuthenticationOne of the major changes introduced with the WPA2 standard is the judicial separation of user authentication from the enforcement of message integrity and privacy, thereby providing a to a greater extent scalable and robust security architecture suitable to home networks or corporate networks with equal prowess. Authentication in the WPA2 Personal mode, which does not regard an authentication server, is performed between the client and the AP generating a 256-bit PSK from a plain-text pass vocalize (from 8 to 63 characters). The PSK in conjunction with th... ...sed VPN offers high network throughput, fail performance and more reliability, since there is no processor overhead. However, it is also more expensive. 3. A computer software-based VPN provid es the most flexibility in how traffic is managed. This type is suitable when VPN endpoints are not controlled by the same party, and where different firewalls and routers are used. It pot be used with hardware encryption accelerators to enhance performance. 4. An SSL VPN (Secure Sockets Layer virtual(prenominal) private network) is a form of VPN that can be used with a standard electronic network browser. In contrast to the traditional Internet protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialized client software on the end users computer. Its used to give remote users with access to Web applications, client/server applications and internal network connections.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment