.

Tuesday, May 28, 2019

Essay --

SolutionWPA2 Wi-Fi Protected Access 2 (WPA2) based on the IEEE 802.11i beat is an improvement to the 802.11 standard that specifying security mechanisms for wireless meshs. On June 24th, 2004, this standard been uses to replaces the previous security specifications, Wired Equivalent Privacy (WEP), which was shown to have severe security weaknesses. Wi-Fi Protected Access (WPA) had previously been introduced as a solution to WEP insecurities. WPA implemented only a subset of IEEE 802.11i. WPA2 makes use of a specific mode of the Advanced Encryption Standard (AES) known as the Counter Mode Cipher Block Chaining-Message Authentication Code (CBC-MAC) protocol (CCMP). CCMP provides both data confidentiality (encryption) and data justice. The use of the Advanced Encryption Standard (AES) is a more secure alternative to the RC4 stream cipher used by WEP and WPA.802.11 Security solutionWEPWPAWPA2CipherRC4RC4AESKey Size40 bits128 bits encryption 64 bits authentication128 bitsIV Size24 bit s48 bits48 bitsData IntegrityCRC-32MichaelCCMHeader IntegrityNoneMichaelCCMReplay AttackNoneIV SequenceIV SequenceKey ManagementNoneEAP-BasedEAP-BasedWPA2 AuthenticationOne of the major changes introduced with the WPA2 standard is the separation of user authentication from the enforcement of message integrity and privacy, thereby providing a more scalable and robust security architecture sufficient to home networks or corporate networks with equal prowess. Authentication in the WPA2 individual(prenominal) mode, which does non require an authentication server, is performed between the client and the AP generating a 256-bit PSK from a plain-text pass phrase (from 8 to 63 characters). The PSK in conjunction with th... ...sed VPN offers high network throughput, better performance and more reliability, since there is no processor overhead. However, it is also more expensive. 3. A software-based VPN provides the most flexibility in how traffic is managed. This type is suitable when VP N endpoints are not controlled by the same party, and where different firewalls and routers are used. It can be used with hardware encryption accelerators to enhance performance. 4. An SSL VPN (Secure Sockets Layer virtual snobby network) is a form of VPN that can be used with a standard Web browser. In contrast to the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialized client software on the end users computer. Its used to give remote users with access to Web applications, client/server applications and midland network connections.

No comments:

Post a Comment