Premium Essay

Wpa2 Wireless Encryption

In:

Submitted By charliebongo
Words 974
Pages 4
WPA2 Wireless Encryption Security
By
Charles Miller

TS8004: WPA2 Wireless encryption

Abstract
The purpose of this research paper is to explore technologies best suited for wireless security technologies. The paper in itself will include research into WP2 Technology and how it fits in making best security measures for an organization. When an organization implements wireless technology, the aspect of keeping communications secured from sources that could use this information being transferred wireless to gain financial information, market advantage and personal gain is a concern for security involvement and risk. This literary review explores a security involved in WPA2 wireless encryption technology.

Table of Contents
Abstract.......................................................................................................................................... 2
Table of Contents........................................................................................................................... 3
Introduction....................................................................................................................................4
Background.................................................................................................................................... 5
Problem Definition......................................................................................................................... 5
Vulnerabilities................................................................................................................................ 6
Vulnerability Definitions ...............................................................................................................6
Programming

Similar Documents

Free Essay

Wireless Lan Security

...3/20/2014 www.informationweek.com/whitepaper/download/showPDF?articleID=901061&site_id=&profileCreated= The Cable Guy - May 2005 Wi-Fi Protected Access 2 (WPA2) Overview By The Cable Guy The original IEEE 802.11 standard provided the following set of security features to secure wireless LAN communication: Two different authentication methods: Open system and shared key The Wired Equivalent Privacy (WEP) encryption algorithm An Integrity Check Value (ICV), encrypted with WEP, which provided data integrity Over time, these security features proved to be insufficient to protect wireless LAN communication in common scenarios. To address the security issues of the original IEEE 802.11 standard, the following additional technologies are used: The IEEE 802.1X Port-Based Network Access Control standard is an optional method for authenticating 802.11 wireless clients. IEEE 802.1X provides per-user identification and authentication, extended authentication methods, and, depending on the authentication method, encryption key management dynamic, per-station or per-session key management and rekeying. Wi-Fi Protected Access (WPA) is an interim standard adopted by the Wi-Fi Alliance to provide more secure encryption and data integrity while the IEEE 802.11i standard was being ratified. WPA supports authentication through 802.1X (known as WPA Enterprise) or with a preshared key http://www.informationweek.com/whitepaper/download/showPDF?articleID=901061&site_id=&profileCreated= 1/6 ...

Words: 1834 - Pages: 8

Premium Essay

Netw W1 Hands on Project

...Week 1 Wireless Concepts Report DeVry University NETW360: Wireless Technologies and Services Hands on Lab Wireless Concepts Submitted to: Professor: Date: 1/24/2014 Configuring a Wireless Access Point In this Project we were assigned to configure an access point and test the results. Pictured in the figure below is one of the first steps in regards to setup. We chose an easy router name of Group 4 NETW360 to make things easy. Following this logic we chose an automatic configuration Dynamic Host Configuration Protocol (DHCP). What DHCP does is that it provides network configuration parameters, such as IP addresses, to DHCP clients automatically versus manually. Figure - 1 Wireless Setup The next step after the basic setup was to configure the wireless setting for our access point. We had to choose a Service Set Identifier (SSID) name which essentially is the public name of our wireless network. In keeping things easy we chose Group4 NETW360. The wireless channel was left on auto due to most wireless end devices will auto-detect and adjust their channel numbers to match that of the router. Also we didn’t want to hide the SSID so we decided to broadcast is by enabling the option, this allows devices to easily find our particular network. Figure - 2 Network Connection In order for us to statically configure the router the necessary information was found by accessing the network connection. Below in the figure are the results. Figure - 3 Wireless...

Words: 925 - Pages: 4

Free Essay

Network Trpubleshooting

...Wireless Security Submitted on CS 571 Network System Administration Professor Mitch Cochran Wireless Security Write-up Assignment 2 California University of Management and Sciences Spring Quarter 2015 Submitted by Prasad Gundu G134013 WIFI SECURITY Many organizations and users have discovered that wireless communications and devices are helpful, adaptable and simple to use. Users of Wireless local network devices have flexibility to movie their smart devices one spot to another inside their workplaces while keeping up network with the system. Wireless personal networks permit users to share the information and applications to system networks and different users with compatible devices, without being fixed to printer cables and other peripheral device connections. Users of handheld gadgets, for example, individual computerized partners (PDAs) and phones can synchronize information in the middle of PDAs and PCs and can utilize system administrations, for example, wireless email, web browsing, and Internet access. Further, wireless network connections can help associations cut their wiring costs. What is the Risk? Wireless networks and handheld devices are Vulnerable against a large number of the same risks as conventional wired systems. Intruders who get access to information systems by means of wireless networks can bypass firewall security. When they have access to systems, intruders can launch denial of service attacks, steal personal information, violate the...

Words: 917 - Pages: 4

Premium Essay

Data Encryption

...Unit 2 Assignment – Data Encryption Security & Lab 3.10D and Lab 3.10E Oren Shedo Kaplan University Abstract Computer key encryption is becoming popular day by day because of hackers within the online world. Hackers are cracking into peoples systems left and right for their own personal gain and gaining information that can be used for identity theft. Identity theft is one of the biggest cybercrimes out there today. There are numerous security protocols and techniques out there to secure your computer though from hackers and curious people out there in the Internet. Security protocols such as secure socket layer and transport layer security are the most popular now for securing ecommerce websites. Secure socket layer is even popular for securing peoples email system as well as sender policy framework for filtering spam mail and not cluttering your inbox with junk. Another topic that is popular these days is what type of security key should we put on our networks. This report will go through why a WPA2 type security key is vital to a network for security. Part 1 - Lab 3.10D – Using the Windows Encrypting File System (EFS) 1. 2 to 6. 7. When a networked user tried to access the encrypted test3 folder, they were given an access denied error. 9. 11. When transferring test1.txt into the test3 folder, it turned into an encrypted file. 12. 13-14. for #13, the test5.txt stayed encrypted within the test folder. 16. Operation of exporting certificate was...

Words: 1801 - Pages: 8

Free Essay

Nt1110

... WPA, WPA2 05/13/2014 * Wired Equivalent Privacy (WEP):  WEP is the original encryption protocol developed for wireless networks. As the name implies, WEP was supposed to be as secure as a wired network. However, WEP has many security flaws, is difficult to configure and is easily hacked. The Wi-Fi Alliance officially retired WEP in 2004. Due to US restrictions, many manufactures were limited to making their devices 64 bit. It was not until these restrictions were lifted that it was increased to 128 bit. Even though 256 bit was introduced, 128 bit remains the most common. Wi-Fi Protected Access (WPA):  WPA was made as something better to use instead of WEP while 802.11i wireless security standard was being developed. Current use of WPA uses a preshared key (PSK) also known as WPA Personal and the Temporary Key Integrity Protocol (TKIP) for its encryption. WPA used the 256 bit keys that are a huge improvement over WEP’s 64 bit. One of the significant changes was integrity checks that would determine if an attacker had captured or altered packets. WPA, like its predecessor WEP both have been shown in public demonstrations to be vulnerable to intrusion. Wi-Fi Protected Access II (WPA2) WPA2 officially replaced WPA in 2006. One of the biggest differences between WPA and WPA2 was the mandatory use of AES algorithms and the introduction of CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol). WPA2 is the best encryption available...

Words: 296 - Pages: 2

Free Essay

Wlan Security

...WLAN Security First of all I want to talk about WPA. There are two types of WPA authentication: WPA and WPA2. WPA is designed to work with all wireless network adapters, but it might not work with older routers or access points. WPA2 is more secure than WPA, but it will not work with some older network adapters. WPA is designed to be used with an 802.1X authentication server, which distributes different keys to each user. This is referred to as WPA-Enterprise orWPA2-Enterprise. It can also be used in a pre-shared key (PSK) mode, where every user is given the same passphrase. This is referred to as WPA-Personal or WPA2-Personal. The third type of security is WEP. WEP is an older network security method that's still available to support older devices, but it's no longer recommended. When you enable WEP, you set up a network security key. This key encrypts the information that one computer sends to another computer across your network. However, WEP security is relatively easy to crack, and I recommend using WPA2, if possible. WPA or WPA2 are more secure. Stating that above I recommend using WPA2 for everything Sure maybe WPA2 isn’t the “best” option for home use but it’s better to be safe than sorry. Next are the security features other than encryption that can be used on wireless LANs. I suggest changing the default network name. When you set up your network equipment, change the default name to make it more difficult for hackers to find. Do not choose a name that is information...

Words: 501 - Pages: 3

Free Essay

The Difference Between Cracking a Wep and a Wpa Network Passkey and How to Protect Yourself from It

...N. Justin Bernard Management 6740 Executive Summary “Wireless Networking and How to Keep Yourself Protected” Technology is consistently evolving and changing and wireless networking is no exception. There are constant updates as well as vulnerabilities in wireless networking, and my goal is to inform you of those vulnerabilities to help you stay protected from them. Wired Equivalent Protocol (WEP) was the original wireless security protocol. WEP was flawed in numerous ways and hackers were able to get information in minutes. WPAv1 was then introduced as an interim replacement because WEP was that flawed. WPAv1 was made to improve on the secure wireless networks and also used a newer and more improved algorithm. When WPAv2 was finally released, many devices began to be created to be compatible with the AES algorithm WPAv2 uses. There still have not been any major hacks or attacks on a WPAv2-AES network that would cause the Wi-Fi alliance look into using another algorithm a replacement. WPAv1 is too easy to hack so it is not recommended and WPAv1 is now susceptible to multiple types of attacks. There are several different ways you can help to protect yourself and your information. Verify your spam in your e-mail to make sure a file accidentally was not forwarded to spam. There are also others to improve your security. The length of your passkey is very important in security, as well as keeping an up-to-date anti-virus and staying up-to-date on all the latest hacks, cracks, and...

Words: 3607 - Pages: 15

Free Essay

Wlan Security

...basics security standards in today’s wireless networks, how they work, existing flaws and vulnerability’s. We will go trough the basic architecture of 802.11, the security it provides like WEP, WPA and WPA2. Further more we will go trough some practical experiment exploiting the flaws described in the article. The result of our practical experiments show upon how easy it is to break encryptions and deploying Evil twins, even with very little understanding of the security structure. 2.1 802.11 Standards The architecture of the wireless LANs is specified by the 802.11 standard created by IEEE [1]. There are a few versions of the standard with differences in frequency and speed. Briefly these are a few of the current standards 802.11 (1997): 2.4Ghz, 2Mbps 802.11a (1999): 5Ghz, 54Mbps 802.11b (1999): 2.4Ghz, 11Mbps 802.11g (2003): 2.4Ghz, 54Mbps Even when things like speed and frequency differ, most things are the same as the original 802.11 standard. They all are using the same medium access protocol, CSMA/CS and have features for increasing range by the cost of speed. They also support the two connection modes of ad-hoc and infrastructure, but since this reports is about practical WLAN security we'll not go any further in on that and just care about the infrastructure mode. 1. Introduction Where ever you go, either it’s an workplace, coffeeshop, library or even a park there is a high chance today that you’r able to connect to wireless networks. However, with the rising...

Words: 4798 - Pages: 20

Free Essay

Video Summary 7

...Video Summary 7 5_04- FILE SHARING AND PERMISSIONS, 5_06-WIRELESS SECURITY AND 5_07-MALWARE 5_04-FILE SHARING AND PERMISSIONS * Click start * Click on my documents * Right click on Projects * Click on tools * Click on View * Click on Use simple file sharing (recommended) * Then click OK * Right click on Projects * Click on Sharing and Security * To share this folder with other users of this computer only, drag it to the Shared Document folder * Click on Customize * Click on tools * Click on Folder Options * Click on Use simple file sharing * Click OK * Click on Projects again * Click on share the folder * Change user limits PERMISSIONS * Share permissions * NTFS permissions * Click on permissions under User limits * Click on Everyone * Limit the permission for everyone * Click on security for special permission ie; Administrator * Specific permissions are covered on Security + test and Network + test * Deny overrides on all other permissions * Click on advanced in Security * Click on permissions * Inheritance means child objects inherit permissions of parent * Permissions are inherited * Click on start * Right click on My documents * Click on Manage * Click on Shared Folders * Click on Shares * Click on projects * Administrative shares are visible only to administrators On this Video Slide I pretty much learned how to Share...

Words: 831 - Pages: 4

Free Essay

Save Documents and Software of Video Meeting

...lose. Second is to reduce the number of business trips. Third is to reduce communication expense. Fourth is that some clients cannot send and receive large drawing. Fifth is that all engineering drawings and proposals are important assists should be retaining from disaster. Sixth is to found a way to minimize the effort and loan procedures. Seventh is that full wireless network coverage is required in all office areas. 2. Solutions to the addressed issues 2.1. Save documents 2.1.1. Dropbox Dropbox is a free service that lets you bring all your photos, documents, and videos anywhere. Any file you save to your Dropbox will also automatically save to all your computers, phones, and even the Dropbox website. This means that you can start working on your computer at school or the office, and finish on your home computer. Never email yourself a file again!(1) 2.1.2. Drop Box (for business) The space is 1,000 GB when you start to use it. If you run out, tell them and they will increase it for free. It support WORD、EXCEL、POWER POINT、PDF etc. The files are stored using 256-bit AES(Advanced Encryption Standard)encryption, and SSL(Secure Sockets Layer) creates a secure tunnel for data transfers. You can remotely unlink the device to prevent anyone from accessing files if your phone is lost or stolen. It can avoid the important information lost. When you send the e-mail with the large files, you should zip. If you create a link to the files in Dropbox, you can view or download the...

Words: 2947 - Pages: 12

Free Essay

Wpa 2

...or PEAP; * WPA-Personal, a mechanism for using TKIP without IEEE 802.1x authentication by using a shared passphrase, intended for consumer networks. In July 2004, the IEEE approved the full IEEE 802.11i specification, which was quickly followed by a new interoperability testing certification from the WiFi Alliance known as WPA2. WPA2 is based on the Robust Security Network (RSN) mechanism, which provided support for all of the mechanisms available in WPA, as well as: * Strong encryption and authentication support for infrastructure and ad-hoc networks (WPA is limited to infrastructure networks); * Reduced overhead in key derivation during the wireless LAN authentication exchange; * Support for opportunistic key caching to reduce the overhead in roaming between access points; * Support for pre-authentication, where a station completes the IEEE 802.1X authentication exchange before roaming; * Support for the CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) encryption mechanism based on the Advanced Encryption Standard (AES) cipher as an alternative to the TKIP protocol. As of March 2006, the WPA2 certification became mandatory for all new equipment certified by the Wi-Fi Alliance, ensuring that any reasonably modern...

Words: 407 - Pages: 2

Premium Essay

Wired vs Wireless Media

...The pros and cons to wired and wireless media The main difference between wired and wireless media is the data transmission is sent with the understanding that with wired media, the data is sent through wired cabling, and wireless is sent using a broadcast signal through the air. Wireless networking is actually sent through the air in the form of a radio wave. The distance that wireless information can usually travel about 150 feet indoors and 300 feet outdoors. (Fredman, 2013) When using wireless in a home or business, a major challenge to the transmission range would be obstructions such as walls. In order to send and receive information two main devices are needed; a wireless router and a wireless network interface card in a computer. Depending on the type of network that will be used, the expenses would vary. A wireless network can potentially be more expensive. The reason for this is because the security of data should be a main priority. Data that is sent through wireless transmissions by default is unsecure and anyone with a wireless device could connect and use the bandwidth of that access point. This is why securing a wireless access point is very important. Most wireless access points are ready with specific encryption methods. Wired Equivalent Privacy (WEP): This encryption allows 64 or 128 bit encryption and uses a word and converts it to hexadecimal. This encryption is possible to be hacked with the correct hacking tools...

Words: 1166 - Pages: 5

Free Essay

Wireless Network Security

...Wireless Network Security Wireless networks in personal homes are becoming more and more popular. With the ease of using no wires and the signal being broadcasted throughout the house, the new printers coming out that are network ready, and along with the new gaming systems like Playstation 3 and Xbox 360 all have wireless network settings. A wireless network is the most vulnerable network out if the precautions of taking time to set up the security properly. Everyone saves personal important information on their computer systems. When there is a wireless network with the settings not set right the computer system is fair game for any, who would like to look at information stored on the computer system. Viruses are not the only thing to protect against. Outsiders or even a neighbor can easily get into a computer’s information though a wireless network. Identity theft can even get implemented with wireless security, if you have a lot of personal information. Credit card information and bank account information can all be stolen from the system and then used for evil. Not only are personal homes affected, but businesses can be too. WarDriving is a big fad among the computer ‘hackers.’ WarDriving came from the movie “WarGames” staring Matthew Broderick. In the movie he did what was called “wardialing”. Wardialing is to keep dialing numbers that would access a computer system’s modem until you find a modem and gain access. WarDriving is where someone can drive around in a vehicle...

Words: 3576 - Pages: 15

Free Essay

It 241 Final Assignment

...Associate Level Material Appendix J Wireless Network Plan Use the following outline to create your wireless network plan. Fill in each section of the plan as required. Deployment Scenario The deployment scenario of the wireless network that I will be using is going to be the infrastructure mode with an Extended Service Set. In the infrastructure setup there will be a wired network as well as a wireless network. Access points, switches, and Ethernet cables will be used in this network to be able to connect a switch to the access point and from one access point to the next. Various access points will be necessary to cover all the areas necessary. I will put a dedicated access point for the Conference Room, one access point for one side of the user stations, one access point for that same side of the stations and offices, and in the other side of the concrete wall one access point for the stations and break room and the other access point for the stations and offices. There will be a wired network running through the offices as well for a wired connection and a wired connection for the conference room as well. The only ones that will be wireless only will be the call center stations. Deployment Scenario Rationale The reason to choose an infrastructure mode is because of the structure of the floor design. The infrastructure mode will allow the access points to communicate with each other through a wired network. While the wired network connects all the access...

Words: 1380 - Pages: 6

Premium Essay

Intel Guide

...Intel® PROSet/Wireless WiFi Connection Utility User's Guide Intel® PROSet/Wireless WiFi Connection Utility User's Guide Supported wireless adapters: Intel® Intel® Intel® Intel® Intel® Intel® Intel® Intel® Intel® Intel® Intel® Intel® Centrino® Ultimate-N 6300 Centrino® Advanced-N + WiMAX 6250 Centrino® Advanced-N 6200 Centrino® Wireless-N 1000 WiMAX/WiFi Link 5350 WiFi Link 5300 WiMAX/WiFi Link 5150 WiFi Link 5100 Wireless WiFi Link 4965AGN Wireless WiFi Link 4965AG_ PRO/Wireless 3945ABG Network Connection PRO/Wireless 3945_BG Network Connection With your WiFi network card, you can access WiFi networks, share files or printers, or even share your Internet connection. All of these features can be explored using a WiFi network in your home or office. This WiFi network solution is designed for both home and business use. Additional users and features can be added as your networking needs grow and change. Depending on the model of your Intel WiFi adapter, your adapter is compatible with 802.11a, 802.11b, 802.11g, and 802.11n (draft 2.0) wireless standards. Operating at 5 GHz or 2.4 GHz frequency at data rates of up to 450 Mbps, you can now connect your computer to existing high-speed networks that use multiple access points within large or small environments. Your WiFi adapter maintains automatic data rate control according to the access point location and signal strength to achieve the fastest possible connection. All of your wireless network connections are easily managed...

Words: 75784 - Pages: 304