Sistema de blogs Diarium
Universidad de Salamanca
Pablo Gallardo's Blog
My professional web log about IT, Cybersecurity & Project Management
 

Types of Wi-Fi Connections

Encryption algorithms:

  • RC4
  • AES

Encryption protocols:

  • Temporal Key Integration Protocol (TKIP)
  • Cipher-block Chaining Message authentication Protocol (CCMP)

Wi-Fi security modes:

  • WEP
  • WPA
  • WPA2

Authentication options supported by WPA, WPA2 and WPA3:

  1. Preshared key (PSK) or personal (PER)
  2. IEEE 802.1X or enterprise (ENT)router connection

PSK is the use of a static fixed password or authentication.

ENT enables the leveraging of and existing AAA (Authentication, Authorization and Accounting) service to be used for authentication.  Some examples of AAA services are RADIUS (Remote Authentication Dial-In User Service) or TACACS+.

Most domestic networks (for example, those having a password printed on a label on the router) use PSK authentication option.

Types of security protocols

Some Wi-Fi Security (WPA and WPA2) support different types of security protocols. They are described below.

Temporal Key Integration Protocol (TKIP)

DEPRECATED

It is an older encryption protocol that was considered to substitute the very insecured WEP. TKIP is actually pretty close to WEP, so you should not use it.

TKIP makes use of the RC4 encryption method.

Cipher-block Chaining Message authentication Protocol (CCMP)

Cipher-block Chaining Message authentication Protocol (CCMP) makes use of AES encryption method. Sometimes CCMP security protocol is referred as AES.

AES is one of the most popular symmetric key encryption protocol, and it has come to replace other protocols that have been deprecated.

 

Type of Wi-Fi Security

Wired Equivalent Protocol (WEP)

Deprecated

It can be hacked easily because of a vulnerability that was detected.

 

Wi-Fi Protected Access (WPA)

There is:

  • WPA-TKIP: it can be hacked easily. Not recommended.
  • WPA-AES: as WPA2-AES supersedes this option, it is not recommended.

 

Wi-Fi Protected Access (WPA2)

There is:

  • WPA2-TKIP: it can be hacked easily. Not recommended.
  • WPA2-AES: fair secure. Recommended over any other option.
  • WPA2-TKIP/AES: It is the most compatible option, but is still drags the vulnerabilities from TKIP,

You might be also interested in…

External references

pmgallardo

About pmgallardo

I studied Computer Science at University of Salamanca. Since then, I have been working first as developer and then as SAP consutant. This blog is about problems I dealt when using computers, and more important, the solutions I found. Whenever I am on an issue and suddenlly I have a flash that leads me to a solution, I document my discoveries in a post.

, , , , , , , , , , , , , ,

No comments yet.

Leave a Reply


*

Política de privacidad
Studii Salmantini. Campus de excelencia internacional