Netgear WGPS606 WGPS606 User Manual - Page 49

How Does WPA Compare to WEP?, For 802.11, WEP encryption is optional. For WPA - aes

Page 49 highlights

Reference Manual for the NETGEAR 54 Mbps Wireless USB Print Server with 4-Port Switch • Enhanced data privacy • Robust key management • Data origin authentication • Data integrity protection Starting August of 2003, all new Wi-Fi certified products had to support WPA. NETGEAR implemented WPA on client and access point products and made this available in the second half of 2003. How Does WPA Compare to WEP? WEP is a data encryption method and is not intended as a user authentication mechanism. WPA user authentication is implemented using 802.1x and the Extensible Authentication Protocol (EAP). Support for 802.1x authentication is required in WPA. In the 802.11 standard, 802.1x authentication was optional. For details on EAP specifically, refer to IETF's RFC 2284. With 802.11 WEP, all access points and client wireless adapters on a particular wireless LAN must use the same encryption key. A major problem with the 802.11 standard is that the keys are cumbersome to change. If you don't update the WEP keys often, an unauthorized person with a sniffing tool can monitor your network for less than a day and decode the encrypted messages. Products based on the 802.11 standard alone offer system administrators no effective method to update the keys. For 802.11, WEP encryption is optional. For WPA, encryption using Temporal Key Integrity Protocol (TKIP) is required. TKIP replaces WEP with a new encryption algorithm that is stronger than the WEP algorithm, but that uses the calculation facilities present on existing wireless devices to perform encryption operations. TKIP provides important data encryption enhancements including a per-packet key mixing function, a message integrity check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. Through these enhancements, TKIP addresses all of known WEP vulnerabilities. How Does WPA Compare to IEEE 802.11i? WPA is forward compatible with the IEEE 802.11i security specification. WPA is a subset of 802.11i and uses certain pieces of the 802.11i were ready to bring to market, such as 802.1x and TKIP. The main pieces of 802.11i that are not included in WPA are secure IBSS (Ad-Hoc mode), secure fast handoff (for specialized 802.11 VoIP phones), as well as enhanced encryption protocols such as AES-CCMP. These features require hardware upgrades and as of January 2005 are now becoming widely available. Wireless Networking Basics B-9 202-10083-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66

Reference Manual for the NETGEAR 54 Mbps Wireless USB Print Server with 4-Port Switch
Wireless Networking Basics
B-9
202-10083-01
Enhanced data privacy
Robust key management
Data origin authentication
Data integrity protection
Starting August of 2003, all new Wi-Fi certified products had to support WPA. NETGEAR
implemented WPA on client and access point products and made this available in the second half
of 2003.
How Does WPA Compare to WEP?
WEP is a data encryption method and is not intended as a user authentication mechanism. WPA
user authentication is implemented using 802.1x and the Extensible Authentication Protocol
(EAP). Support for 802.1x authentication is required in WPA. In the 802.11 standard, 802.1x
authentication was optional. For details on EAP specifically, refer to IETF's RFC 2284.
With 802.11 WEP, all access points and client wireless adapters on a particular wireless LAN must
use the same encryption key. A major problem with the 802.11 standard is that the keys are
cumbersome to change. If you don't update the WEP keys often, an unauthorized person with a
sniffing tool can monitor your network for less than a day and decode the encrypted messages.
Products based on the 802.11 standard alone offer system administrators no effective method to
update the keys.
For 802.11, WEP encryption is optional. For WPA, encryption using Temporal Key Integrity
Protocol (TKIP) is required. TKIP replaces WEP with a new encryption algorithm that is stronger
than the WEP algorithm, but that uses the calculation facilities present on existing wireless devices
to perform encryption operations. TKIP provides important data encryption enhancements
including a per-packet key mixing function, a message integrity check (MIC) named Michael, an
extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. Through
these enhancements, TKIP addresses all of known WEP vulnerabilities.
How Does WPA Compare to IEEE 802.11i?
WPA is forward compatible with the IEEE 802.11i security specification. WPA is a subset of
802.11i and uses certain pieces of the 802.11i were ready to bring to market, such as 802.1x and
TKIP. The main pieces of 802.11i that are not included in WPA are secure IBSS (Ad-Hoc mode),
secure fast handoff (for specialized 802.11 VoIP phones), as well as enhanced encryption protocols
such as AES-CCMP. These features require hardware upgrades and as of January 2005 are now
becoming widely available.