翻訳と辞書
Words near each other
・ Wi Katene
・ Wi Kuki Kaa
・ Wi Parata v Bishop of Wellington
・ Wi Pere
・ WI Sports
・ Wi Taepa
・ Wi Whitu
・ Wi, Inc.
・ WI-38
・ Wi-Fi
・ Wi-Fi Alliance
・ Wi-Fi array
・ Wi-Fi deauthentication attack
・ Wi-Fi Direct
・ Wi-Fi positioning system
Wi-Fi Protected Access
・ Wi-Fi Protected Setup
・ Wi-jún-jon
・ Wi-not mobile
・ Wi-Tribe
・ WIA
・ WIAA
・ WIAA (FM)
・ Wiaan Liebenberg
・ WIAB
・ WIAC
・ WIAC (AM)
・ WIAD
・ Wiaderno
・ Wiadomości


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Wi-Fi Protected Access : ウィキペディア英語版
Wi-Fi Protected Access
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP).〔(【引用サイトリンク】 title=Understanding WEP Weaknesses )
WPA (sometimes referred to as the ''draft IEEE 802.11i'' standard) became available in 2003. The Wi-Fi Alliance intended it as an intermediate measure in anticipation of the availability of the more secure and complex WPA2. WPA2 became available in 2004 and is a common shorthand for the full IEEE 802.11i (or IEEE 802.11i-2004) standard.
A flaw in a feature added to Wi-Fi, called Wi-Fi Protected Setup, allows WPA and WPA2 security to be bypassed and effectively broken in many situations.〔 WPA and WPA2 security implemented without using the Wi-Fi Protected Setup feature are unaffected by the security vulnerability.
== WPA ==
The Wi-Fi Alliance intended WPA as an intermediate measure to take the place of WEP pending the availability of the full IEEE 802.11i standard. WPA could be implemented through firmware upgrades on wireless network interface cards designed for WEP that began shipping as far back as 1999. However, since the changes required in the wireless access points (APs) were more extensive than those needed on the network cards, most pre-2003 APs could not be upgraded to support WPA.
The WPA protocol implements much of the IEEE 802.11i standard. Specifically, the Temporal Key Integrity Protocol (TKIP) was adopted for WPA. WEP used a 40-bit or 104-bit encryption key that must be manually entered on wireless access points and devices and does not change. TKIP employs a per-packet key, meaning that it dynamically generates a new 128-bit key for each packet and thus prevents the types of attacks that compromised WEP.
WPA also includes a message integrity check, which is designed to prevent an attacker from altering and resending data packets. This replaces the cyclic redundancy check (CRC) that was used by the WEP standard. CRC's main flaw was that it did not provide a sufficiently strong data integrity guarantee for the packets it handled. Well tested message authentication codes existed to solve these problems, but they required too much computation to be used on old network cards. WPA uses a message integrity check algorithm called ''Michael'' to verify the integrity of the packets. Michael is much stronger than a CRC, but not as strong as the algorithm used in WPA2. Researchers have since discovered a flaw in WPA that relied on older weaknesses in WEP and the limitations of Michael to retrieve the keystream from short packets to use for re-injection and spoofing.〔(【引用サイトリンク】 title=Battered, but not broken: understanding the WPA crack )

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Wi-Fi Protected Access」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.