ZyXEL NBG2105 User Guide - Page 85

WPA-PSK and WPA2-PSK

Page 85 highlights

Chapter 13 Wireless LAN WEP Data Encryption WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the NBG2105 and the AP or other wireless stations to keep network communications private. Both the wireless stations and the access points must use the same WEP key for data encryption and decryption. Authentication Type The IEEE 802.11b/g/n standard describes a simple authentication method between the wireless stations and AP. Three authentication types are defined: Both, Open and Shared. • Open mode is implemented for ease-of-use and when security is not an issue. The wireless station and the AP or peer computer do not share a secret key. Thus the wireless stations can associate with any AP or peer computer and listen to any transmitted data that is not encrypted. • Shared mode involves a shared secret key to authenticate the wireless station to the AP or peer computer. This requires you to enable the wireless LAN security and use same settings on both the wireless station and the AP or peer computer. • Both authentication mode allows the NBG2105 to switch between the open system and shared key modes automatically. Use this mode if you do not know the authentication mode of the other wireless stations. WPA-PSK and WPA2-PSK Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, authentication and key management than WPA. Key differences between WPA(2) and WEP are improved data encryption and user authentication. Both WPA and WPA2 improve data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. WPA and WPA2 use Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) to offer stronger encryption than TKIP. The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only difference between the two is that WPA(2)-PSK uses a simple common password, instead of user-specific credentials. The common-password approach makes WPA(2)-PSK susceptible to brute-force password-guessing attacks but it's still an improvement over WEP as it employs a consistent, single, alphanumeric password to derive a PMK which is used to generate unique temporal encryption keys. This prevent all wireless devices sharing the same encryption keys. (a weakness of WEP) If both an AP and the wireless clients support WPA2-PSK, use WPA2-PSK for stronger data encryption. If the AP or the wireless clients do not support WPA2-PSK, just use WPA-PSK. Select WEP only when the AP and/or wireless clients do not support WPA-PSK or WPA2-PSK. WEP is less secure than WPA-PSK or WPA2-PSK. NBG2105 User's Guide 85

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146

Chapter 13 Wireless LAN
NBG2105 User’s Guide
85
WEP
Data Encryption
WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the
NBG2105 and the AP or other wireless stations to keep network communications private. Both the
wireless stations and the access points must use the same WEP key for data encryption and
decryption.
Authentication Type
The IEEE 802.11b/g/n standard describes a simple authentication method between the wireless
stations and AP. Three authentication types are defined:
Both
,
Open
and
Shared
.
Open
mode is implemented for ease-of-use and when security is not an issue. The wireless
station and the AP or peer computer do not share a secret key. Thus the wireless stations can
associate with any AP or peer computer and listen to any transmitted data that is not encrypted.
Shared
mode involves a shared secret key to authenticate the wireless station to the AP or peer
computer. This requires you to enable the wireless LAN security and use same settings on both
the wireless station and the AP or peer computer.
Both
authentication mode allows the NBG2105 to switch between the open system and shared
key modes automatically. Use this mode if you do not know the authentication mode of the other
wireless stations.
WPA-PSK and WPA2-PSK
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.11i) is a
wireless security standard that defines stronger encryption, authentication and key management
than WPA.
Key differences between WPA(2) and WEP are improved data encryption and user authentication.
Both WPA and WPA2 improve data encryption by using Temporal Key Integrity Protocol (TKIP),
Message Integrity Check (MIC) and IEEE 802.1x. WPA and WPA2 use Advanced Encryption
Standard (AES) in the Counter mode with Cipher block chaining Message authentication code
Protocol (CCMP) to offer stronger encryption than TKIP.
The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only difference
between the two is that WPA(2)-PSK uses a simple common password, instead of user-specific
credentials. The common-password approach makes WPA(2)-PSK susceptible to brute-force
password-guessing attacks but it’s still an improvement over WEP as it employs a consistent,
single, alphanumeric password to derive a PMK which is used to generate unique temporal
encryption keys. This prevent all wireless devices sharing the same encryption keys. (a weakness of
WEP)
If both an AP and the wireless clients support WPA2-PSK, use WPA2-PSK for stronger data
encryption. If the AP or the wireless clients do not support WPA2-PSK, just use WPA-PSK. Select
WEP only when the AP and/or wireless clients do not support WPA-PSK or WPA2-PSK. WEP is less
secure than WPA-PSK or WPA2-PSK.