.

Tuesday, May 28, 2019

Essay --

SolutionWPA2 Wi-Fi Protected Access 2 (WPA2) based on the IEEE 802.11i standard is an improvement to the 802.11 standard that specifying security mechanisms for wireless networks. On June 24th, 2004, this standard been uses to replaces the previous security specifications, Wired Equivalent Privacy (WEP), which was shown to have severe security weaknesses. Wi-Fi Protected Access (WPA) had previously been introduced as a source to WEP insecurities. WPA implemented only a subset of IEEE 802.11i. WPA2 makes use of a specific mode of the Advanced Encryption Standard (AES) known as the Counter Mode account Block Chaining-Message Authentication Code (CBC-MAC) protocol (CCMP). CCMP provides both data confidentiality (encryption) and data integrity. The use of the Advanced Encryption Standard (AES) is a much secure preference to the RC4 stream cipher used by WEP and WPA.802.11 Security solutionWEPWPAWPA2CipherRC4RC4AESKey surface40 bits128 bits encryption 64 bits assay-mark128 bitsIV Siz e24 bits48 bits48 bitsData IntegrityCRC-32MichaelCCMHeader IntegrityNoneMichaelCCMReplay AttackNoneIV placeIV SequenceKey ManagementNoneEAP-BasedEAP-BasedWPA2 AuthenticationOne of the major changes introduced with the WPA2 standard is the separation of user authentication from the enforcement of message integrity and privacy, thereby providing a much scalable and robust security architecture suitable to home networks or corporate networks with equal prowess. Authentication in the WPA2 Personal mode, which does not require an authentication server, is performed between the client and the AP generating a 256-bit PSK from a plain-text pass phrase (from 8 to 63 characters). The PSK in conjunction with th... ...sed VPN offers high network throughput, better performance and more reliability, since there is no processor overhead. However, it is also more expensive. 3. A software-based VPN provides the most flexibility in how traffic is managed. This type is suitable when VPN endpoints a re not controlled by the same party, and where different firewalls and routers are used. It bay window be used with hardware encryption accelerators to enhance performance. 4. An SSL VPN (Secure Sockets Layer virtual private network) is a form of VPN that can be used with a standard Web browser. In contrast to the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialise client software on the end users computer. Its used to give remote users with access to Web applications, client/server applications and internal network connections.

No comments:

Post a Comment