Documente Academic
Documente Profesional
Documente Cultură
Presented by :
Swadhin Kumar Bohidar Roll#CS200117017
INTRODUCTION
• Brought by the Wi-Fi Alliance, working in
conjunction with the IEEE.
• Standards-based, interoperable security
specification
• Significantly increases the level of data
protection and access control for existing and
future wireless LAN systems
WPA at a Glance
• WPA is a subset of the 802.11i draft standard and
will maintain forward compatibility
• It addresses all known vulnerabilities in WEP to
ensure data authenticity on wireless LANs
• It provides an effective deterrent against almost all
known attacks.
WEP at a Glance
• Wired Equivalency Privacy, was intended to provide
wireless users with the same level of privacy inherent
in wired networks.
The WEP flaws :
• Weak Keys
• Initialization Vector (IV) Reuse
• Known plaintext attacks
• Denial of Service attacks
continued…
Presented By: Swadhin Kumar Bohidar [5/12]
Technical seminar Presentation
Wi-Fi Protected Access
WPA: How It Works (continued…)
National Institute of Science & Technology
Is It Perfect?
WPA, however, is not without its vulnerabilities.
• It is susceptible to denial of service (DoS) attacks.
• If the access point receives two data packets that fail
the Message Integrity Code (MIC) check within 60
seconds of each other then the network is under an
active attack .
• This may just prove that no single security tactic is
completely invulnerable. But WPA is a definite step
forward in WLAN security.