O'Reilly logo

How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN by CCNA Lee Barken - CISSP MCP, CPA

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

WPA for the Home

As described earlier, TKIP (and WPA) rely upon an 802.1x infrastructure (such as RADIUS servers) to be in place for key distribution. Not all home users have this infrastructure in place; therefore, in order to use the advanced encryption features of TKIP, WPA has introduced a special mode called Pre-Shared Key (PSK).

In this special mode, all the user has to do is enter a shared secret (called a master key) in the AP and each client. This is similar to the way WEP worked when you had to enter a WEP key in the AP and each client. However, unlike WEP, TKIP uses the master key as a starting point to mathematically derive the other encryption keys. Unlike WEP, which used the static key over and over again, TKIP changes the encryption ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required