Thursday, December 25, 2014

This is the method of


This is the method of "shared key" is also known, is a classic technique in which, after ensuring that Makhdoom is aware of the secret key, identity verification. huntapac In this way, the access point (AP) generates a random string and sends it to subserve. Makhdoom The random string with a preset key (also called the WEP key) encryption and sends the result to the access point. Access point decrypts the message inverse method and compares the string sent. The consistency of the message, the access point that has the correct key Makhdoom sure. The exchange of the encryption and decryption of RC4. The RC4 encryption assuming you know the way, the danger lurking in this way:
A) The only way that the identity Dstrsyst point Makhdoom sure. In other words, Makhdoom not have any reason to know that you are exchanging data point Dstrsyyy Rmzyst Aslyst access point. B) All methods such as the method based on the questions and answers between the two sides, huntapac with the purpose of authentication or exchange of vital information, are entitled to the man-in-the-middle attacks huntapac are at risk. In these attacks, the attacker is between the two sides and each side Bhgvnhyy mislead. huntapac
The service in the areas of security, it is often referred to as the Confidentiality means keeping information secure and confidential user or nodes are exchanging information with each other. Mhrmanhgy commonly used encryption techniques huntapac to observe, if he hears Bhgvnhyykh are exchanging information, this information without the encryption keys can not be decrypted and therefore useless for Shnvdgr abuse.
Standard 802.11b, techniques huntapac based on the RC4 WEP encryption is used. RC4 is a symmetric encryption algorithm, in which a semi-random string of data that is generated by the code. The encryption is implemented on the entire packet. huntapac In other words, all the layers of data over wireless connections are encrypted by this method, the IP to higher layers such as HTTP. Since this is the most practical method of applying security policies based on standard 802.11b wireless LANs, usually abbreviated to the process Amnsazy in the standard WEP told. 40-bit to 104-bit WEP keys can not measure. The key with IV (Initialization Vector acronym or initial vector) 24-bit and 128-bit RC4 key combination and a form. Naturally, the larger the size of the key information security is higher. Research shows that using a key size of 80 bits or more brute-force technique is virtually impossible to crack. In other words, the number of possible keys to 80 bits (the number of which is in the order of 24) to Andaz hyy high current huntapac computer systems huntapac processing power is not enough huntapac to break the key assumptions in reasonable time. Although the majority of wireless LANs use 40 bit keys for encrypting packets, but Nkthyy recently, huntapac based on a series of experiments has been obtained, provided that the method Mhrmanhgy by WEP attacks, other than the by brute-force, is also vulnerable and this vulnerability is related to the size of the key used.
The 802.11b standard is also a service which allows the exchange of information between Mkhdvmhay wireless huntapac access points decreases. Method is the use of a CRC code. As also shown in the previous figure, a CRC-32 is produced before Rmzshdn closed. At the receiver, after decoding, CRC decoded data is recalculated and compared with the CRC written in the packet CRC is any difference between the two means changing the contents of the package huntapac during the exchange. Unfortunately this method as the encryption method RC4, independent of the size of the security key used against some known attacks is vulnerable.
Unfortunately 802.11b standard is no mechanism for managing security keys and keys to secure virtually all operations carried out by those who must manually install a wireless network to be implemented. Since this part of the security of the encryption Mzlhay key topic, with many ways to attack huntapac this weakness is actually conceivable wireless networks. These procedures are usually performed on an easy Angaryhay by users and network administrators, such as continuous Tghyyrndadn key, key Lvdadn, using duplicate keys or switches factory default and neglect, but the result has been a relatively high percentage of successful attacks on wireless networks does not. The problem of larger huntapac networks and their shows. Even assuming an attempt to prevent the occurrence of such S hlangaryhayy, when the number of network huntapac Mkhdvmhay than actually controlling the number is going up very difficult and sometimes errors occur in the corners of the network is relatively large, the network leads to penetrate huntapac the corpses.
As mentioned, practically based security in WEP protocol is based on the 802.11 standard. In standard mode on 40 bit keys for WEP encryption by using the RC4 algorithm, although some producers certain versions of the WEP keys with numbers

No comments:

Post a Comment