Currently, there are multiple types of access controls that are implemented to restrict access to computer systems and prevent potential malicious attacks. This paper discusses potential benefits and safety enhancements that are offered by WPA2 Personal/Enterprise wireless encryption protocols. Wireless networks currently employ various types of encryption algorithms with different degrees of safety: none (no encryption), WEP (static or dynamic 64 or 128 bit encryption key; at present, compromised by multiple proven malicious attacks), TKIP (improved version of WEP), and AES (the most useful algorithm). WPA or WPA2 (encryption types) in fact define the encryption algorithm that is employed to protect wireless network (TKIP or AES). Since the majority of client adapters currently support WPA2 (AES), there is no need to set encryption algorithm as TKIP. The major difference between WPA2 Personal and WPA2 Enterprise is the source of encryption key that is used in AES algorithm. For local applications (WPA2 Personal), the key is static (it is normally a word, a combination of symbols or otherwise defined password) with a minimum length of 8 symbols that is set up in the access point settings and is the same for all clients of a given wireless network. Once the key is leaked, it should be changed immediately. Thus, this type of encryption is applicable only for small number of network clients. WPA2 Enterprise employs a dynamic key that is generated by a RADIUS authorization server. This key is assigned to each network client individually. It may be updated without breaking the connection. Due to its dynamic nature and additional encryption protocols, WPA2 Enterprise ensures absolute protection to corporate wireless networks. References
Moskowitz, R. (2003) Weakness in Passphrase Choice in WPA Interface. Wi-Fi Net News, Nov. 4. Web. Available at: < HYPERLINK "http://wifinetnews.com/archives/2003/11/weakness_in_passphrase_choice_i n_wpa_interface.html" http://wifinetnews.com/archives/2003/11/weakness_in_passphrase_choice_in _wpa_interface.html >
Strom, D. (2006) Tutorial: How to set up WPA2 on your wireless network. Computerworld, August 24. Web. Available at: < HYPERLINK "http://www.computerworld.com/s/article/9002706/Tutorial_How_to_set_up_W PA2_on_your_wireless_network_" http://www.computerworld.com/s/article/9002706/Tutorial_How_to_set_up_WP A2_on_your_wireless_network_ >
Running head: DB3 PAGE \* MERGEFORMAT 1
DB3 PAGE \* MERGEFORMAT …