Wi-Fi Protected Access
WPA is the successor to the WEP protocol. After the weaknesses in the WEP implementations were discovered, WPA served as a stop-gap measure for securing wireless networks while the IEEE 802.11 standards committee developed a more robust and permanent solution. The inner workings of WPA were specified in the early versions of the IEEE 802.11i standard.
Two flavors of WPA exist: Temporal Key Integrity Protocol WPA (TKIP/WPA) and Advanced Encryption Standard WPA (AES/WPA).
In this tutorial:
- Securing Wireless Networks
- Security Background
- Security Services
- Cryptographic Concepts and Terms
- Encryption and Decryption
- Keyspace
- Exclusive OR (XOR)
- Algorithm
- Asymmetric Encryption Algorithms
- Public-Private Key Cryptography
- Cipher
- Concealment Ciphers vs. Running Key Ciphers
- Stream Ciphers vs. Block Ciphers
- Cipher Examples
- Cipher Implementations
- Wi-Fi Protected Access
- TKIP/WPA
- Wi-Fi Protected Access 2 (WPA2)
- CCMP/AES
- Hash Functions
- EAP
- EAP Entities
- EAP Grammar
- EAP Types
- EAP-TTLS
- EAP-PSK
- EAP-SIM
- EAP-AKA
- IEEE 802.11i
- Four-Way Handshake
- IEEE 802.11i Considerations