P-660 series Support Notes
i
g all the
802.11 WEP uses IV and base key to generate streaming encryption keys for data
encryption this includes weak IV which co promised by a cracker if he have
collected enough transmitted data frame.
TKIP uses IV and base key to hash a new key for every packet
WiFi Protected Access (WPA) is the new security standard adopted by the WiF
Alliance consortium. WPA uses Temporal Key Integrity Protocol (TKIP). TKIP is
designed to allow WEP to be upgraded. This means that all the main building blocks
of WEP are present, but corrective measures have been added to address security
problems. WPA (TKIP) provides much stronger security than WEP, addressin
weaknesses and allowing compatibility and upgrades with older equipment.
uld be com
The length of the IV has been increased from 24bits to 48bits. Rollover of the counter
is eliminated. Reuse of keys is less likely.
125
All contents copyright © 2005 ZyXEL Communications Corporation.