online sources to answer the following questions a Describe
online sources to answer the following questions: a. Describe the primary differences between WEP, WPA, and WPA2 protocols. b. Describe how algorithms enhance the security of the above protocols.
Solution
Please follow the data and description :
a) WEP :
Wired Equivalent Privacy is the full form of WEP and is to be noted that it is the most widely used Wi-Fi security algorithm in the world. The initial versions of WEP are not that particularly strong for the world to work with. Even after the respective and the particularly the revisions to the algorithm and even an increased key size, over time numerous security flaws were discovered in the WEP standard and, that as the computing power increased, it became easier and easier to exploit them. Despite various improvements, work-arounds, and other attempts to increase the WEP system, effectiveness it remains highly vulnerable and systems that rely on WEP should be upgraded or, if security upgrades are not an option, replaced.
b) WPA :
Wi-Fi Protected Access is the full form of the WPA. This was the Wi-Fi Alliance’s direct response and replacement to the increasingly apparent security threats or the issues of the WEP standard. The most common WPA configuration is considered as the WPA-PSK (Pre-Shared Key). The keys used by WPA are of 256-bit.
Later some of the significant changes implemented with the WPA included the message integrity checks, Temporal Key Integrity Protocol (TKIP). This employs a per-packet key system that was more secure than the fixed key used in the WEP system. TKIP was later superseded by Advanced Encryption Standard (AES). WPA, is stated like its the predecessor of WEP.
c) WPA2 :
Wi-Fi Protected Access II is the full form of WPA2. It is to be noted that the WPA has superseded by WPA2. One of the most significant changes between WPA and WPA2 was the mandatory use of AES algorithms and the introduction of Counter Cipher Mode with Block Chaining Message Authentication Code Protocol as a replacement for TKIP.
Hope this is helpful.
