Talk:Wi-Fi Protected Access

From Wikipedia, the free encyclopedia

WikiProject on Cryptography This article is part of WikiProject Cryptography, an attempt to build a comprehensive and detailed guide to cryptography in the Wikipedia. If you would like to participate, you can choose to edit the article attached to this page, or visit the project page, where you can join the project and see a list of open tasks.

Contents

[edit] Merging Wi-Fi Protected Access with IEEE 802.11i

Regarding merging the WPA page with the IEEE 802.11i, my vote (if any were taken) would be no.

WPA does not implement all the features of IEEE 802.11i (pre-authentication is not supported, for example).

Some of the features WPA implements is also different from 802.11i: the OUI used for the RSN information element, the information element ID used, and the group key is not provided as part of the initial 4-way handshake, are examples of some of the differences between WPA/WPA2 and 802.11i.

There does not appear to be an overlap between the WPA and 802.11i pages. The WPA page discusses Wi-Fi security from the user/admin point of view (i.e., what EAP types to use) while the 802.11i page discusses Wi-Fi security from the technical point of view (4/2-way handshakes, algorithms implemented).

As I see it, users and Wi-Fi administrators would rather read the WPA page while network engineers would rather read the 802.11i page.

So, let's keep the information separate.

Regards, Kam-Yung 2005-11-07


I agree that the WPA and IEEE 802.11i pages should not be merged. WPA and 802.11i are not one in the same and there currently is not much overlap between the pages.
my say is no. 59.93.130.205 15:54, 12 November 2005 (UTC)
I concur that these are two distinct items: WPA/WPA2 are certified, market-driven implementations; 802.11i is a distinct standard that was ratified and exists as a document. I vote no. Glenn Fleishman 1 December 2005
I agree that we shouldn't merge. — Matt Crypto 11:33, 2 December 2005 (UTC)

[edit] Attacks on WPA

I'd like to query this:

However, it is not perfect; attacks remain feasible against RC4, even with large key and IV sizes.

What feasible attacks exist for RC4 as used in WPA? I've found a discussion of weak passphrase choice, but that's not really the protocol's fault per se: [1]. — Matt 23:43, 10 Nov 2004 (UTC)

[edit] WPA or WPA2?

I'm a little bit confused by this passage in the article: "The Wi-Fi Alliance have announced that they will use the term WPA2 to refer to the full IEEE 802.11i standard". Why didn't they just call it WPA and went for the additional number? What's the difference between the two? I'm guessing that there are now 3 things: WEP, WPA and WPA2, right? Could anybody maybe clarify this? Thanks :-) --Andy

I think there are three things. This is my understanding (which could well be flawed): First there was WEP which was found to be very flawed. While working on a new standard, the industry introduced WPA as an intermediate solution to fix the flaws in WEP; WPA implements a subset of the new standard. Eventually, the new standard (IEEE 802.11i) was released, and I believe the Wi-Fi Alliance call this by the alternative name "WEP2""WPA2 (for whatever reason). At least, that's the understanding I ended up with the last time I did some reading on this topic! — Matt Crypto 01:22, 25 Feb 2005 (UTC)
Matt, you mean "WPA2", not "WEP2", right? The main difference between WPA and WPA2 is that the use of AES in WPA2 is a MUST (cf. also Q&A document on [2]). WPA was a snapshot of the development of the IEEE 802.11i standard at that time, since there was a need for immediate "fixing" of the WEP/RC4 protocol weaknesses (can't quote sources for that, aside of my professor's script, sorry). WPA2 is not introduced to fix problems of WPA, though, but rather is the equivalent to 802.11i, according to the same Q&A document.
Since AES is more resource intensive, a lot of equipment can probably not be upgraded by software only. Ub 18:27, 12 Mar 2005 (UTC)
Oops, yes, WPA2, not WEP2 ;-) Darned TLAs (see also WAP...) — Matt Crypto 08:57, 13 Mar 2005 (UTC)
WPA was designed to work with existing WiFi cards (though not all existing base stations). Apple has been able to get WPA working on its original Airport (802.11b) cards, for example. WPA's big weakness is not RC4 but the HMAC it uses, a hash called "Michael," which was admittedly weak, but the most the designers were able to implement on the most anemic WiFi cards in service. In fact, to protect against brute force attacks on Michael, WPA shuts itself down for 30 seconds whenever it detects two attack packets. (I argued at the time that this made the protocal subject to stealthy denial of service attacks.) WPA2 uses strong cryptographic primitives throughout. Long term, WPA2 is unquestionably the way to go, but WPA is a huge step over WEP, which was badly broken. WPA is a good solution for networks until all older cards can be replaced or retired. --agr 05:19, 13 Mar 2005 (UTC)

Comments from Tom Carpenter:

WPA2 is an encryption solution that is based on and meets the requirements of 802.11i. More specifically, it is a certification program provided by the Wi-Fi ALliance that verifies the compliance with 802.11i and the interoperability with other WPA2 certified equipment.

WPA2 requires the use of AES and this is far more secure than WPA's continued use of RC4 with TKIP (Temporal Key Integrity Protocol - used for key rotation on a periodic basis); however, WPA's security is still sufficient for most environments today. There is an exception and that is in government implementations. These installations require FIPS compliance and WPA does not meet this, but WPA2 does.

I hope this further clarification helps, Tom Carpenter - SYSEDCO —The preceding unsigned comment was added by 24.33.129.4 (talk • contribs) 15:53, 20 January 2006 (UTC)

[edit] PSK Passphrase

The article says : "The passphrase may be from eight to 63 ASCII characters or 64 hexadecimal digits (256 bits)."

Some equipment does not allow entering a 64 digit key, but ONLY a 63 character passphrase.

An example : The Asus WL-500G Deluxe WLAN router.

Does Windows XP Professional support it ? I set a 64 hex char passphrase on my AP and entered the same key into Windows WPA dialog and got no connection. When I used a shorter passphrase in the same way (same fields in same dialogs), it worked. The AP I used was Canyon CN-WF514.

--213.253.102.145 17:22, 15 November 2005 (UTC)


To be certified as WPA compatible the device MUST accept a 64 charcter passphrase!!!!!!!!!

Just because some equipment may not implement this has nothing to do with the WiFi Alliance defined standard!

[edit] How secure is WPA2?

Are there any known practical or theortical attacks on WPA2? Considering how insecure WEP is this article should definitely have a section dedicated tracking the current opinion on strength or weakness of WPA2. The current article has some discussion on weak passphrases but it is not clear where WPA2 is destine to stand in the pantheon of encryption protocols. Funkyj 06:46, 12 December 2005 (UTC)

I think the intro of the article is pretty clear on this. There are no other issues with WPA2 that i am aware of. 802.11i underwent a through review by the IEEE. If some exploit is published, I expect the article will be updated the same day.--agr 16:25, 15 December 2005 (UTC)

[edit] WPA-PSK

The information about WPA-PSK security in this article does not match what's said in the Wireless security article. 193.217.204.29 14:29, 4 January 2006 (UTC)


The Wireless security is off target .... WPA is fine in PSK mode if used with 64 character hex. It's also fine if you use a 'good' password.

[edit] Chop out DiceWare

The references to Diceware seem totally out of place in this section. Diceware never appears in the IEEE standards, it is not a well adopted mechanism. The DiceWare 'strength' is used in place of the WiFi Alliance recommended practices and the abiity to use 64 char hex.

[edit] Apple

What's all the 'hey look apple support wpa2' promotion doing in this wiki ? I don't think it's wise to build up a list with compatible devices.