Wi-Fi Protected Access - WPA

WPA

The Wi-Fi Alliance intended WPA as an intermediate measure to take the place of WEP pending the availability of the full IEEE 802.11i standard. WPA could be implemented through firmware upgrades on wireless network interface cards designed for WEP that began shipping as far back as 1999. However, since the changes required in the wireless access points (APs) were more extensive than those needed on the network cards, most pre-2003 APs could not be upgraded to support WPA.

The WPA protocol implements much of the IEEE 802.11i standard. Specifically, the Temporal Key Integrity Protocol (TKIP), was adopted for WPA. WEP used a 40-bit or 104-bit encryption key that must be manually entered on wireless access points and devices and does not change. TKIP employs a per-packet key, meaning that it dynamically generates a new 128-bit key for each packet and thus prevents the types of attacks that compromised WEP.

WPA also includes a message integrity check. This is designed to prevent an attacker from capturing, altering and/or resending data packets. This replaces the cyclic redundancy check (CRC) that was used by the WEP standard. CRC's main flaw was that it did not provide a sufficiently strong data integrity guarantee for the packets it handled. Well tested message authentication codes existed to solve these problems, but they required too much computation to be used on old network cards. WPA uses a message integrity check algorithm called Michael to verify the integrity of the packets. Michael is much stronger than a CRC, but not as strong as the algorithm used in WPA2. Researchers have since discovered a flaw in WPA that relied on older weaknesses in WEP and the limitations of Michael to retrieve the keystream from short packets to use for re-injection and spoofing.

Read more about this topic:  Wi-Fi Protected Access

Famous quotes containing the word wpa:

    It is told that some divorcees, elated by their freedom, pause on leaving the courthouse to kiss a front pillar, or even walk to the Truckee to hurl their wedding rings into the river; but boys who recover the rings declare they are of the dime-store variety, and accuse the throwers of fraudulent practices.
    —Administration in the State of Neva, U.S. public relief program. Nevada: A Guide to the Silver State (The WPA Guide to Nevada)

    “Pop” Wyman ruled here with a firm but gentle hand; no drunken man was ever served at the bar; no married man was allowed to play at the tables; across the face of the large clock was written “Please Don’t Swear,” and over the orchestra appeared the gentle admonition, “Don’t Shoot the Pianist—He’s Doing His Damndest.”
    —Administration in the State of Colo, U.S. public relief program. Colorado: A Guide to the Highest State (The WPA Guide to Colorado)

    John Eliot came to preach to the Podunks in 1657, translated the Bible into their language, but made little progress in aboriginal soul-saving. The Indians answered his pleas with: ‘No, you have taken away our lands, and now you wish to make us a race of slaves.’
    —Administration for the State of Con, U.S. public relief program. Connecticut: A Guide to Its Roads, Lore, and People (The WPA Guide to Connecticut)