5 Replies Latest reply: Oct 14, 2010 1:07 PM by MGGN RSS

    SECURITY PROTOCOLS, CONFUSED

    MGGN

      Hello guys,

       

       

      Since I begun in a wireless world, i get confused abut security, specifically speaking, Im confused about protocols, first of all, I would like to define authentication protocols (wich ones are) and encryption protocols, Maye you could thing that "googling" should be a good beging, and yes, it is. However i need an clear introduction about these 2 kind of protocols (auth & encryp).

      These are some word that produce me a nightmare:

       

      WAP(1/2),WEP KEY, TKIP, AES, EAP and others...

       

      thanks CLN.

        • 1. Re: SECURITY PROTOCOLS, CONFUSED
          Martin

          Authentication protocols are MS-CHAP, MS-CHAPv2,  CHAP, NT LAN Manager, EAP, AKA, Kerberos, and much more.

           

          Encryption are Internet Key Exchange, IPsec,  Kerberos,  Point to Point Protocol, Transport Layer Security.

           

          WAP and WEP are wireless encryption protocols.

          • 2. Re: SECURITY PROTOCOLS, CONFUSED
            Jared

            Think of authentication as identifying who is access the network.  Authentication protocols identify users, EAP, LEAP, PEAP, EAP-FAST and EAP-TLS are all Authentication protocols.  Actually EAP stands for Extensible Authentication Prococol.  As you can see there are various flavors of EAP.

             

            Encyption protocols are protocols that encypt a wireless transmission over the air so it can't be hijacked or read by anyone else.  Encryption protocols would include RC4, which is used by WEP; TKIP, which is used by WAP and AES which is used by WPA2.

             

            WEP, WPA and WPA2 are all security methods that incorporate both encryption and authentication.

             

            Also, mac address could be used as a form of authentication.

            • 3. Re: SECURITY PROTOCOLS, CONFUSED
              jonas.fossion

              I think that the last post before mines it's a very good summary !!!

              When you think about authentification you have to think about EAP with all the variants:

               

              • LEAP
              • PEAP
              • EAP-TLS --> the most used, but you need certificates for the user and the server.
              • EAP-FAST --> owner of Cisco, you need to have a client Cisco for the user because you need to generate a pac files. But when you have the client Cisco, easy to configure. I have made this configuration with a Wism card and that works fine.


              Also when you thing about encryption you have different algorithm:

               

              • RC4 --> used by WEP with key of 40, 104 and 128 bits. This algorithm is easy to crack, so be carreful if you configure this one. Some distribution of Unix are created to crack this type of key in +- 30 min. It's why WEP is not very secure because it used RC4.

               

              • You have also RC4 and TKIP useb by WPA, in fact, but WPA is cracked now also because it use RC4 also.

               

              • So, the last protocol for the encryption is AES, used by WPA2 and this one is not yet cracked.

               


              I have followed the course last week so, the security protocols are always clear in my mind.

              • 4. Re: SECURITY PROTOCOLS, CONFUSED
                Conwyn

                Hi MGGN

                 

                Wep also has an authentication protocol but it is so weak that nobody uses it so you normally use open protocol.

                 

                Once traffic is on the AP then you use EAP. EAP only allows through EAP type packets. These EAP packets can be as described above LEAP PEAP etc

                Once authentication has completed the AP will allow normal traffic to flow to and from the WiFi user.

                 

                Regards Conwyn

                • 5. Re: SECURITY PROTOCOLS, CONFUSED
                  MGGN

                  Thank u guys,

                   

                  Last day i was thinking If there is(are) disadvantages of use WPA or WPA2?? More power of processing?? Communication Wireless slower??