From the course: Networking Foundations: Local Area Networks (LANs)

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Securing your network with WPA2

Securing your network with WPA2

- [Instructor] Wi-Fi Protected Access was released in 2003 as a temporary stop gap to replace the aging and failed web authentication method. Many wireless cards designed for web were upgradable to WPA through a simple firmware update, which helped many organizations migrate without having to completely change hardware. WPA implements, much of what was standardized in WPA2, like temporal key integrity protocol, which is better known as TKIP. TKIP was also used as a stop gap and was later depreciated in 2009 as no longer secure. It was a lighter protocol that could run on some legacy equipment. TKIP makes the secret key with the initialization vector before sending it to the RC4 initialization. Web simply concatenated the two. WPA also includes a sequence counter that prevents replay attacks. WPA also employs a 64-bit message integrity check, which ensures that forged packets aren't accepted. Another large improvement in…

Contents