|
|
8.5 | Enterprise Wireless Encryption | ||
| 8.5.1 | Strengthening WEP |
|
WPA includes mechanisms from the emerging
802.11i standard for improving wireless data encryption. WPA has TKIP,
which uses the same algorithm as WEP, but it constructs keys in a
different way
TKIP is also called WEP Key hashing and
was initially referred to as WEP2. TKIP is a temporary solution that
fixes the key reuse problem of WEP, as illustrated in Figure
TKIP uses RC4 to perform the encryption, which is the same as WEP. A major difference from WEP, however, is that TKIP changes temporal keys every 10,000 packets. This provides a dynamic distribution method, which significantly enhances the security of the network. An advantage of using TKIP is that companies having existing WEP-based access points and radio NICs can upgrade to TKIP through relatively simple firmware patches. In addition, WEP-only equipment will still interoperate with TKIP-enabled devices using WEP. TKIP is only a temporary solution. Most experts believe that stronger encryption is still needed.
|