WPA and WPA-2 -Personal (WPA-PSK): This is used for home networks and small-scale office networks as it doesnt need the server based authentication.In our earlier tutorials, we have learned more about security protocols, authentication, authorization and access methods that are used to access a network or wireless devices.We have also explored the various kinds of network security measures that are taken to make our overall network system secure from unauthorized access and virus attacks.Here, in this tutorial, we will briefly learn about Network security keys that are used for safeguarding our network along with its various kinds.
What Is My Network Password Or TheWhat You Will Learn: What is a Network Security Key Types of Network Security Key 1) WEP 2) WPA and WPA2 How to Find Password on Router, Windows, and Android How to Find Network Security Key for Router How to Find Network Security Key for Windows How to Find Network Security Key for Android What is Network Security Key Mismatch Error and How to Fix It Is Network Security Key Same As The Password Conclusion Recommended Reading What is a Network Security Key The network security key is a kind of network password or the passphrase in the form of physical, digital signature or biometric data password that is used to provide authorization and accessibility to the wireless network or device on which the client requests to connect with. The security key also provisions to establish a secure connection between the requesting client and the serving network or wireless device like routers etc. Types of Network Security Key The most common types of a network security key that are used for authorization in wireless networks include Wi-Fi protected access (WPA and WPA2) and wired equivalent privacy (WEP). WEP WEP uses a 40-bit key for encryption of the data packet. This key is combined with a 24-bit IV (initialization vector) to make an RC4 key. There are two kinds of authentication methods used i.e. In the open system authentication method, the requesting client host need not present the credentials to the access point for authentication as any client can try to associate with the network. While in the shared key authentication, the WEP key is used for authentication by deploying a four-way challenge-response handshake process. Firstly, the host client sends the authentication request to the access point. Then the access point in response sends back the clear-text challenge. By using the WEP key, the client host will encrypt the challenge text and send it back to the access point. The response will then be decrypted by the access point and if it is identical to the challenge text, then it will transmit a positive reply. Later the authentication and the association process will get completed and again the WEP key is used for encryption of the data packets using RC4. From the above process, it seems that this process is a secure one, but practically the key can easily be decoded by anyone by cracking the challenge frames. Therefore, this method of encryption and authentication is less in practice and the WPA which is a more secure method than this has been evolved. WEP Encryption: 2) WPA and WPA2 The host device which wants to connect to the network requires the security key to start the communication. The WPA and WPA-2 both work on the principle that after the validation of the key, the exchange of data among the host device and the access point is in an encrypted form. The WPA deploys a temporal key integrity protocol (TKIP) which uses a per- packet key which means that it dynamically produces a fresh 128-bit key each time when a packet arrives and allocates the same to the data packet. It does have a message integrity check, which guards the data against the viruses that can modify and re-transmit the packets according to themselves. In this way, it replaces the cyclic redundancy check method for error detection and correction that was used by the WEP. There are different divisions of the WPA depending upon the kind of the user using it.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |