We kindly inform you that we have also www.cyberbajt.com Zamknij

Search results:

Raporty i testy urządzeń

  • wróć do listy testów i raportów

    The WLAN security

    Stanisław Sirko, 2007-07-11, Drukuj
  • 5.

    TKIP Protocol

    The TKIP protocol has become a transition method worked out in order to ensure the security in 802.11 networks, after revealing weakness of the WEP algorithm. It had two targets. The TKIP protocol not only should remove problems connected with the WEP but also cooperate with currently hardware on the market. Many WEP encryption algorithms have been equipmently implemented, that is why TKIP protocol had to cooperate with basis WEP algorithm mechanisms. Despite of many efficent pattern encryption existing, designers had to work the method out which would not be a reason of throw milions older wireless network cards and access points away.

     

    The TKIP protocol (required for get the WPA certificate) is folded of three protocols out: criptographical integrity message algorithm, key mix algorithm and initial vector extension. As similarly as the WEP protocol use the RC4 algorithm but it received new mechanisms which have  protected from attack, which the WEP was endangered. The best solution in extension of encryption has turned out the modifing of basic WEP key for every data package. The CRC32 was replaced by new integrity code MIC (Message Integrity Check) named 'Michael', which should improve uneffecive checksum ICV on from the 802.11 standard. This algorithm use the unique key which is mixed with source and target MAC address and also whole package fragment included non-encrtypted data. It ensures integrity data package and solves the problem of frames adulteration. Moreover, it was worked precise vector IV generation rules out, what prevents its replays and toughens whole standard from attack with initialization vector confilct. It was also introduced the key mixing for single packages and new mechanism of key management and its exchange. Despite of the WEP algorithm is the base of TKIP protocol, all that features have reduced sensitivity of WEP algorithm considerably for attacks.



    Till now, the TKIP algorithm has been recognized as safe, however security WLAN experts consider that breaking this algorithm is only near future.

  • dalej wstecz

Hold on there sparky! Using IE? Really? Come on now. You really need to move on and get a better browser.