Mic; Tkip; Wep; Wpa - AMX MVP-9000i-GB Instruction Manual

Table of Contents

Advertisement

Typical certificate information can include the following items:
Certificate Issue Date

Extensions

Issuer

Public Key

Serial Number

Signature Algorithm

User

Version


MIC

Short for Message Integrity Check, this prevents forged packets from being sent. Through WEP, it was possible to alter a packet
whose content was known even if it had not been decrypted.

TKIP

Short for Temporal Key Integration, this is part of the IEEE 802.11i encryption standard for wireless LANs. TKIP provides a per-
packet key mixing, message integrity check and re-keying mechanism, thus ensuring that every data packet is sent with its own
unique encryption key. Key mixing increases the complexity of decoding the keys by giving the hacker much less data that has been
encrypted using any one key.

WEP

Short for Wired Equivalent Privacy, WEP is a scheme used to secure wireless networks (WiFi). A wireless network broadcasts
messages using radio which are particularly susceptible to hacker attacks. WEP was intended to provide the confidentiality and
security comparable to that of a traditional wired network. As a result of identified weaknesses in this scheme, WEP was superseded
by WiFi Protected Access (WPA), and then by the full IEEE 802.11i standard (also known as WPA2).

WPA

WiFi Protected Access (WPA and WPA2) is a class of system used to secure wireless (WiFi) computer networks. It was created in
response to several serious weaknesses researchers had found in the previous WEP system. WPA implements the majority of the
IEEE 802.11i standard, and was intended as an intermediate measure to take the place of WEP while 802.11i was prepared (WPA2).
WPA is designed to work with all wireless network interface cards, but not necessarily with first generation wireless access points.
To resolve problems with WEP, the WiFi Alliance released WPA (FIG. 125), which integrated 802.1x, TKIP and MIC. Within the WPA
specifications, the RC4 cipher engine was maintained from WEP. RC4 is widely used in SSL (Secure Socket Layer) to protect
internet traffic.
WPA Overview
FIG. 125

WPA2

Also know as IEEE 802.11i, this is an amendment to the 802.11 standard specifying security mechanisms for wireless networks.
The 802.11i scheme makes use of the Advanced Encryption Standard (AES) block cipher; WEP and WPA use the RC4 stream cipher.
The 802.11i architecture contains the following components: 802.1X for authentication (entailing the use of EAP and an
authentication server), RSN for keeping track of associations, and AES-based CCMP to provide confidentiality, integrity and origin
authentication.
WPA2 implements the full standard, but will not work with some older network cards. Both provide good security, with two
significant issues:
either WPA or WPA2 must be enabled and chosen in preference to WEP.

WEP is usually presented as the first security choice in most installation instructions.

in the "Personal" mode, the most likely choice for homes and small offices, a passphrase is required that, for full security,

must be longer than the typical 6 to 8 character passwords users are taught to employ.
With the RC4 released to the general public, the IEEE implemented the Advanced Encryption Standard (AES) as the cipher engine
for 802.11i, which the WiFi Alliance has branded as WPA2 (FIG. 126).
MVP-9000i - Instruction Manual
Appendix B: Wireless Technology
145

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Mvp-9000i-gw

Table of Contents