![Allnet ALL1682511 Скачать руководство пользователя страница 23](http://html.mh-extra.com/html/allnet/all1682511/all1682511_user-manual_2903627023.webp)
© ALLNET GmbH München 2013 - Alle Rechte vorbehalten
21
7. Glossary
AES
AES stands for
A
dvanced
E
ncryption
S
tandard. It is a preferred standard for the encryption of commercial
and government data using a symmetric block data encryption technique.
TKIP
TKIP stands for
T
emporal
K
ey
I
ntegrity
P
rotocol. It is a wireless security encryption mechanism in Wi-Fi
Protected Access. TKIP uses a key hierarchy and key management methodology that removes the
predictability that intruder relied upon to exploit the WEP key. It increases the size of the key from 40 to 128
bits and replaces WEP’s single static key with keys that are dynamically generated and distributed by an
authentication server, providing some 500 trillion possible keys that can be used on a given data packet. It
also includes a Message Integrity Check (MIC), designed to prevent an attacker from capturing data packets,
altering them and resending them. By greatly expanding the size of keys, the number of keys in use, and by
creating an integrity checking mechanism, TKIP magnifies the complexity and difficulty involved in decoding
data on a Wi-Fi network. TKIP greatly increases the strength and complexity of wireless encryption, making it
far more difficult
—if not impossible—for a would-be intruder to break into a Wi-Fi network.
WEP
WEP stands for
W
ired
E
quivalent
P
rivacy. It is a data privacy mechanism based on a 64/128-bit shared key
algorithm, defined in the IEEE 802.11 standard. WEP aims to provide security by encrypting data over radio
waves so that it is protected as it is transmitted from one end point to another. However, it has been found that
WEP is not as secure as once believed.
`
WPA
WPA stands for
W
i-Fi
P
rotected
A
ccess. It is a Wi-Fi standard that was designed to improve upon the security
features of WEP. The technology includes two improvements over WEP:
Improved data encryption through the temporal key integrity protocol (TKIP). TKIP scrambles the
keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys
haven’t been tampered with.
User authentication, which is generally missing in WEP, through the extensible authentication
protocol (EAP). WEP regulates access to a wireless network b
ased on a computer’s
hardware-specific MAC address, which is relatively simple to be sniffed out and stolen. EAP is built on
a more secure public-key encryption system to ensure that only authorized network users can access
the network.