Question re: Encyption Keys for Wiireless Networks

  • Thread starter Thread starter AA Smith
  • Start date Start date
A

AA Smith

Are WEP and WPA encryption keys basically keys for a random number
generator?

Do administrators create assign their own encryption keys to access points
and all PCMCIAs and PCI NICs in a wireless network? That is, using the same
key assigned to the access point for every PCMCIA and PCI NIC in a wireless
network?

Of course, administrators must conform to the character length and content
requirements of WEP and WPA, but I presume that within those constraints
they are free to create keys consisting of their own choice of characters.
Is that right?
 
WEP Keys are keys created based on a password or phrase that the Wireless LAN
administrator decides.

eg. If I typed in

FLUBBERISGREEN

and clicked Generate WEP Key based on the above phrase, I would get
(depending on the level of encryption I selected) a long encrypted number
like:

10a3bd389261e6a1b

This is what is known as the "Key"

When you go to your Windows machine and attempt to connect to the Secure
Wireless Network, you will need to specify this key (you will also need to
set the network as "WEP Enabled" and "Shared Key" which means you will be
prompted for the Key once and then supposedly never again.

The pitfalls of WEP:
"WEP is vulnerable because of relatively short IVs and keys that remain
static. The issues with WEP don't really have much to do with the RC4
encryption algorithm. With only 24 bits, WEP eventually uses the same IV for
different data packets. For a large busy network, this reoccurrence of IVs
can happen within an hour or so. This results in the transmission of frames
having keystreams that are too similar. If a hacker collects enough frames
based on the same IV, the individual can determine the shared values among
them, i.e., the keystream or the shared secret key. This of course leads to
the hacker decrypting any of the 802.11 frames.

The static nature of the shared secret keys emphasizes this problem. 802.11
doesn't provide any functions that support the exchange of keys among
stations. As a result, system administrators and users generally use the same
keys for weeks, months, and even years. This gives mischievous culprits
plenty of time to monitor and hack into WEP-enabled networks"
more Info:
http://www.wi-fiplanet.com/tutorials/article.php/1368661

WPA vs WEP:
http://www.openxtra.co.uk/articles/wpa-vs-wep.htm

WPA is slightly different in the way that it works, but it is the more
secure of the two. WPA2 is the new kid on the block for Wireless Security:

http://www.wi-fi.org/OpenSection/protected_access.asp
http://www.wi-fi.org/OpenSection/pdf/WPA2_Q_A.pdf

For lots of great info on Wireless Security go here:
http://www.wi-fi.org/OpenSection/secure.asp?TID=2

Be aware that you can also configure Wireless Security and settings via
Group Policy if you are using XP as a client.

In laymans terms WPA uses a changing key so is harder to "crack" wheras WEP
has a key that needs to be changed by the Net Admin, which is often the same
for a long time.
 
Thanks, Numpty! I really appreciate your kind and thorough response. I
haven't used Group Policies before, but the idea intrigues me. I don't know
whether I'm using XP as a client or not. How does one use "XP as a client"?
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Back
Top