We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

See Pricing

What's Your Topic?

Hire a Professional Writer Now

The input space is limited by 250 symbols

What's Your Deadline?

Choose 3 Hours or More.
Back
2/4 steps

How Many Pages?

Back
3/4 steps

Sign Up and See Pricing

"You must agree to out terms of services and privacy policy"
Back
Get Offer

Tudy On Wpa And Wpa2 Computer Science Essay

Hire a Professional Writer Now

The input space is limited by 250 symbols

Deadline:2 days left
"You must agree to out terms of services and privacy policy"
Write my paper

This paper deals with the survey of WPA and WPA2 ; its beginning, development, demands, application, working, benefits and failings. It besides has a comparative survey of both WPA and WPA2 and its difference from their old versions are explained.

Introduction

Wireless webs are one of the most popular and widely used webs in the present universe of web. Procuring a radio web is the greatest challenge faced by the networking field faced in the past and in the present. Wireless web are more prone than any other webs because it can be accessed from anyplace inside the wireless part once the user gets the hallmark information or by choping the hallmark information.

Don't use plagiarized sources. Get Your Custom Essay on
Tudy On Wpa And Wpa2 Computer Science
Just from $13,9/Page
Get custom paper

In 1991 a radio protection encoding system was introduced known as Wired Equivalent Privacy ( WEP ) used to supply confidentiality and unity of the informations by the Wi-Fi Alliance. Later in 2003 the Wi-Fi Alliance introduced an advanced enfranchisement plan the Wi-Fi Protected Access ( WPA ) which implements most of the IEEE 802.11i criterion this conquered terrible jobs faced by WEP.

In 2004 the Wi-Fi Alliance developed a more advanced and a sophisticated version of the enfranchisement plan WPA2 which provides a much more unafraid information encoding and hallmark than WPA. The WPA and WPA2 have proved to be the successful protocol for many old ages.

A brief history of WEP

WEP was the first introduced encoding protocol in IEEE 802.11 criterion ( 1991 ) . It relies on RC4 encoding algorithm. It faced many jobs and proved vulnerable to many onslaughts like the RC4 issue ; it is insecure at any cardinal size, CRC spot tossing onslaught, FMS onslaughts, and Korek onslaughts. Finally in 2004 the WEP was jeopardised and a new encoding protocol was introduced by get the better ofing all the onslaughts faced by it. [ 1 ]

Wi-Fi Protected Access ( WPA )

In 2004 the Wi-Fi Alliance developed a enfranchisement plan which follows the security protocol and which implements the bulk of the IEEE 802.11i criterions. This was developed in order to get the better of the security issues faced by the WEP. WPA uses the encoding system with Temporal cardinal Integrity Protocol ( TKIP ) with Message Integrity Check ( MIC ) and it uses Extensile Authentication Protocol ( EAP ) hallmark mechanism. It besides uses a Pre-shared Key engineering for hallmark. It is based on IEEE 802.11i criterions and with itaa‚¬a„?s inter operable service it increases the information protection degree and the entree control degree to a great extent in the Wi-Fi systems. Unlike WEP it changes the effectual cardinal really frequently doing WPA more secure.

WPA is widely used because since September 2003 all new 802.11b and 802.11 g hardware which are tested by Wi-Fi enfranchisement must implement WPA on it.WPA was designed by good known cryptanalysts and they suggested that it conquers many of the known onslaughts faced by WEP. [ 5 ]

WPA2

In 2004 a 2nd coevals execution of the WPA was developed by the Wi-Fi Alliance the WPA2 which is much more advanced and sophisticated than the WPA. It uses a new encoding engineering the Advanced Encryption Standard ( AES ) which is more advanced encoding system than the WPA encoding system. Like WPA, WPA2 uses the Extensile Authentication Protocol for hallmark which is good secured. This proved to be a more unafraid than any other security plan. In 2006 all hardware approved by 802 Bs and g which has Wi-Fi enfranchisement must hold WPA2 implemented in it. [ 5 ]

TYPES OF MODES

Both WPA and WPA2 have two classified manners Enterprise manner and Personal manner where both the manners provide hallmark and encoding solution. [ 2 ]

Table: Types of Modes of WPA and WPA2

ENTERPRISE MODE

This manner is designed for the endeavor security which operates in a managed manner. It uses the IEEE 802.1x hallmark model which uses the EAP with an hallmark waiter. Thus this manner is a good secured for a big system by supplying a common hallmark between the hallmark waiter and the client through the entree point.

Each user in this manner is assigned a alone key to entree the web therefore supplying single truth. In this manner TKIP encoding is used for WPA in which in each session an encoding key is assigned for every information package communicated by an encoding cypher employed by the TKIP. And AES encoding type is used for WPA2.

PERSONAL MODE

This manner Idaho designed for little concern and place webs where there is no hallmark waiter is used. This uses a PSK for hallmark unlike in endeavor manner where IEEE 802.11 is used. This operates on an unmanaged manner. Here a PSK is shared among users therefore the strength of the PSK should be high.

Personal manner uses TKIP encoding type for WPA and AES for WPA2 like the endeavor manner.

AUTHENTICATION FOR WPA and WPA2

The hallmark procedure is done by IEEE 802.1x model or the EAP model. A common hallmark is initiated in the WPA endeavor and the WPA2 when a user communicates with an Access Point ( AP ) . The user gets the entree to the web merely when it is authenticated by the entree point. The hallmark waiter receives the certificates provided by the user. Common hallmark protects the user from linking to rogue APs by guaranting both the authorised user and the client that the communicating is entitled between them.

The client enters the WLAN merely when the hallmark waiter accepts the users certificates if it does non accepts so it is blocked from come ining into the WLAN. A Pair wise Master Key ( PMK ) is generated at the same time when the user authenticates. Between the client and the AP a four manner handshaking takes topographic point so TKIP and AES gets installed and established for WPA and WPA2 severally therefore finishing the hallmark procedure between the client and the entree point.

Table: Network Authentication Types

There are assorted types of hallmark is used in WPA and WPA2 tabular array 2 shows the hallmark types used by them with RADIUS waiters and PSK. The WPA and WPA2 use the same hallmark mechanism therefore both the encoding type can be at the same time used in the same web as it uses same hallmark mechanism. The description for the hallmark type which is used for both is shown in the tabular array 2. The WPA and WPA2 hallmark are good secured than any other encoding system. [ 4 ]

WPA Encryption Using TKIP

WPA overcomes WEP encoding jobs by utilizing a forceful encoding system provided by Temporal Key Integrity Protocol ( TKIP ) . It replaces the little inactive encoding key of 40 spot which is entered manually on the client devices and the entree points, with a per package 128-bit key. Unlike WEP, WPA generates keys dynamically which avoids the interlopers who rely upon foretelling the key. It operates on the MAC bed.

The hallmark waiter makes the 802.1x generate a alone maestro key or brace wise key for that session during the procedure one time when the useraa‚¬a„?s certificates are authenticated. The cardinal hierarchy and the direction system are maintained by administering the key to the entree point and the client which is done by TKIP. During a session every information package which is communicated is assigned a alone key generated by TKIP. By making this it generates around 280 trillion possible keys for a information package which is hypothetically impossible to follow back.

It besides uses the Message Integrity Check ( MIC ) by supplying a mathematical map where both the sender and the receiving system compute and compare it. If the MICaa‚¬a„?s do non fit so the package is removed presuming it to be tampered. Thus it protects the informations packages from capturing, altering and resending by an aggressor. [ 4 ]

WPA2 Encryption Using AES

AES is a block cypher which is a type of symmetric cypher where a same key is used for encoding and decoding. AES encrypts the spots in blocks of plaintext by ciphering individually alternatively of a individual key put over a plaintext input informations watercourse. In WPA2 the 128 spot AES is used. There are four phases carried out by AES doing one unit of ammunition where every unit of ammunition is iterated several times. For WPA2 the loop is done for 10 times each unit of ammunition.

Counter-Mode/CBC-Mac Protocol ( CCMP ) is used in AES for WPA2. For a block cypher which use same key for both encoding and decoding CCMP will be a new manner of operation. There are two manners used by the CCMP which are the Counter Mode ( CTR ) and the Cipher Block Changing Message Authentication Code ( CBC-MAC ) manner. Data encoding in CCMP is done in the CTR manner and the information unity is provided by the CBC-MAC manner.

As a consequence in the encoding procedure an hallmark constituent is generated by the CCMP utilizing CMC-MAC manner. It differs from the WPA encoding where there is a separate algorithm is required for the unity cheque as in here the unity cheque is done by the CCMP through CMC-MAC default. On top of this a 48-bit Initialisation vector ( IV ) is used by the AES which farther heightening its encoding system. AES is said to be the most powerful encoding system as it requires more than one million millions of operations to interrupt its key. Thus it is said to be a most unafraid cryptanalytic algorithm. WPA2 encoding system utilizing AES is more powerful than the WPA encoding system utilizing TKIP.

Working OF WPA

WPA uses Robust Security Network ( RSN ) a new web architecture which separates message unity from user hallmark. It is more unafraid web architecture and complex. It gives accurate solutions for radio webs. The RSN architecture consists of four stages [ 1 ]

Agring on the security policy

802.1x hallmark

Key derivation and distribution

RSNA informations confidentiality and unity.

Phase 1: Agreeing on the security policy

In the first stage the security policy to be used is agreed by the communicating parties. The security policies carried out by the APs is displayed on a Probe Respond Message which is done by accepting the petition for the investigation from the client. This is followed by an 802.11 unfastened system hallmark and the client is allows entree merely if the hallmark system approves it.

Figure: stage 1: Agreeing on security policy

Phase 2: 802.1X Authentication

The 2nd stage is a standard specific 802.1X hallmark method which are based on extensile hallmark protocol type. 802.1X/EAP requests the client for the enfranchisement which requires a PKI so the hallmark mechanism is initiated one time the client certificates responses the right hallmark information. A maestro key ( MK ) is generated normally to the client and the waiter so a Radius accept message is sent to the AP from the waiter which contains the maestro key and the EAP message particular to the chosen method is sent to the client. Figure 2 shows the 2nd stage.

Figure: stage 2: 802.1X Authentication

Phase 3: Cardinal Hierarchy and Distribution

The 3rd stage consists of the cardinal coevals and the cardinal exchange. The security chiefly depends on the keys, it is maintained by a digest of several assorted keys where every key is assigned a limited life-time which is grouped in a hierarchy. A session key is generated for the security context once it is determined by the hallmark method and is invariably updated until the security is completed.

Figure: stage 3: Cardinal derivation and distribution

This stage consists of three stairss the first 1 is the transmittal of the maestro key from the entree point and AS. The following measure is a four manner manus agitate where the Pair wise Transient Key ( PTK ) and the group Transient Key are derived. The 3rd measure is the reclamation of the GTK by group cardinal handshaking. Figure 3 shows the three stairss of stage 3.

The brace wise cardinal hierarchy is shown in figure 4 in this measure the four manner handshaking is done by the AP where a brace wise maestro key is sent by the client and it is verified with the brace wise transient key which uses the TKIP and CCMP types and the encoding keys are installed in them. During the four manner handshake four EAPOL messages are transmitted between the AP and the client that is the verification key, the encoding key, temporal encoding key and the temporal MIC key

Figure: stage 3: Pair wise cardinal hierarchy

The four manner handshaking is shown in the figure 5. From PMK a fixed twine PTK is derived which is the MAC reference of the AP utilizing the KCK. The synchronism of the two entities are done before encoding

Figure: stage 3: 4 manner handshaking

The group cardinal hierarchy is shown in the figure 6. Group Master Key ( GMK ) generates a Group Transient Key to forestall multicast traffic over the security channel. The encoding protocol determines the length of the GTK harmonizing to TKIP and CCMP of 256 and 128 spots severally. Two keys are classified under GTK which are

Group Encryption Key ( GEK )

Group Integrity Key ( GIK )

Figure: stage 3: Group key hiererchy

In the procedure of Group key handshake an EAPOL key the 1 with the MIC, GTK is sent from the entree point to the waiter and an EAPOL message key which has the response MIC is sent back to the entree point from the client. The session keys that are generated during the four manner handshaking is used in the Group key handshake

The chief intent of this handshaking is to regenerate the Group transient key following the petition sent by the client and for disassociating the host. First a random figure Gnonce is selected and the GTK s calculated. Then the freshly calculated GTK is sent by coding it with KCK along with the GTK sequence figure and the deliberate MIC to the prayer. The GTK is decrypted at the prayer once the MIC is verified. After finishing the group cardinal handshake it sends an acknowledgement message with a GTK sequence figure and the deliberate MIC from the 2nd message as a consequence the new GTK is installed by the appraiser.

Figure: stage 3: Group key handshake

Phase 4: RSNA Data Confidentiality and Integrity

The procedures after the hallmark and encoding take topographic point in this stage. The chief end of this stage is to maintain the information encrypted and to supply the unity of the informations throughout the communicating. Previously generated keys are used in protocol.

Figure: TKIP key-mixing strategy and encoding

TKIP- Temporal Key Hash

CCMP- CTR & A ; CBC-MAC

WRAP ( Wireless Robust Authentication Protocol )

These are the indispensable protocol used in this stage. TKIP depends on RC4 encoding algorithm similar to WEP the chief ground for this is to utilize in the upgraded systems which was antecedently with WEP.TKIP overcomes many exposures faced by WEP like message unity utilizing MAC with Michael algorithm, IV issues by increasing its size and adding new set of regulations, cardinal direction utilizing advanced method of cardinal distribution.

There are two stages involved with the TKIP Key-mixing strategy shown in the figure8. All the inactive informations such as the session key TEK, higher 32 spots of the low-level formatting vector and TA are present in stage 1. The dynamic spots and the variable keys such as the 16 lower spots of the low-level formatting vector and the end products of stage 1. For every package sent the low-level formatting vector value additions by 1 get downing from 0.

Figure: MIC calculation utilizing Michael algorithm

Michael algorithm is used in WPA for the Message unity cheque created by Niels Ferguson. Figure 9 represents the MIC calculation used in WPA.

CCMP relies on AES which is operated in the CCM manner. CCMP depends on AES like TKIP depends on RC4 but CCMP does non compromises itself where TKIP uses RC4 because it has to be implemented on WEP systems with an ascent. In CCMP a same key is used for hallmark and encoding with different IV in other words the hallmark covers the non encrypted informations. Figure 10 shows the CCMP encoding.

Figure: CCMP encoding

The Wireless Robust hallmark protocol is besides based on advanced encoding criterion but here it uses OCB encoding strategy.

BENEFITS OF WPA

WPA overcomes all possible exposures of WEP. It provides user hallmark which lacked in WEP. Major of WPA comes under IEEE 802.11 criterion.

It can be implemented straight as package to about all of the Wi-Fi certified devices. It offers IEEE criterions based Wi-Fi security. It gives a high public presentation degree to little concern webs, place webs and endeavors. Soon many of the router merchandises use WPA encoding in their devices. [ 4 ]

BENEFITS OF WPA2

WPA2 is standard particular based interoperable version of the IEEE 802.11 criterion. It uses AES for encoding and it besides has the hallmark mechanism. Many of the router merchandises have WPA2 encoding in their devices although it can non be upgraded. [ 4 ]

Apt for Home and Small Business Wireless Networks

Like the securities in endeavors the security for little webs and place is every bit of import. The place web can be every bit harmful if it is accessed by other individuals. In the present web universe all the place connexions and little concern webs are Wi-Fi. In a study it is proved that 60-70 % of the place web is unbarred. WPA and WPA2 is the most successful encoding plan used still now. [ 3 ]

WPA & A ; WPA2 WEAKNESSES

WPA & A ; WPA2 faced several failings since it has released but they are non unsafe. The most known onslaught on WPA and WPA2 is the onslaught against its PSK key. Therefore WPA & A ; WPA2 is still considered as the best encoding system. [ 1 ]

Decision

WPA and WPA2 overcome all known possible exposures that are face by WEP therefore heightening the entree control and informations protection to a great extent. They are really strong criterion based protection with an interoperable solution in the radio webs. It provides enormous benefits of a secure Wi-Fi web. It is designed to work with all sort of arrangers, from September 2006 all the IEEE 802 B and g devices which has the Wi-Fi enfranchisement must hold WPA or WPA2 implemented in it hence it is reasonably widely used. Thus WPA and WPA2 encoding types prove to be the best encoding types of all time.

Cite this Tudy On Wpa And Wpa2 Computer Science Essay

Tudy On Wpa And Wpa2 Computer Science Essay. (2016, Dec 05). Retrieved from https://graduateway.com/tudy-on-wpa-and-wpa2-computer-science-essay/

Show less
  • Use multiple resourses when assembling your essay
  • Get help form professional writers when not sure you can do it yourself
  • Use Plagiarism Checker to double check your essay
  • Do not copy and paste free to download essays
Get plagiarism free essay

Search for essay samples now

Haven't found the Essay You Want?

Get my paper now

For Only $13.90/page