Answer to Question #248730 in Computer Networks for Mr Roy

Question #248730
  1. List and explain any four(4) security mechanisms used for securing Wireless Network.
  2. List and explain Cryptographic algorithm classifications.
1
Expert's answer
2021-10-08T23:50:46-0400

(a)

1.Wired equivalent privacy

WEP uses a data encryption scheme that is based on a combination of user and system-generated key values. However, it is widely known that WEP is the least secure network type as hackers have developed tactics of reverse-engineering and cracking the encryption system.

2.WiFi protected access

Wi-Fi Protected Access (WPA) was developed to deal with the flaws that were found with the WEP protocol. WPA offers features such as the Temporal Key Integrity Protocol which was a dynamic 128-bit key that was harder to break into than WEP’s static, unchanging key.

It also introduced the Message Integrity Check, which scanned for any altered packets sent by hackers, the Temporal Key Integrity Protocol and the pre-shared key for encryption.

3.WiFi protected access 2

WPA2 brought significant changes and more features to the wireless security gambit. It replaced TKIP with the Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) which is a far superior encryption tool.

WPA2 has been the industry standard since its inception and the Wi-Fi Alliance stated that all future devices with the Wi-Fi trademark had to use WPA2.

4.WPA2-PSK

WPA2-PSK (Pre-Shared Key) requires a single password to get on the wireless network. It’s generally accepted that a single password to access Wi-Fi is safe but only as much as you trust those using it. A major vulnerability comes from the potential damage done when login credentials get placed in the wrong hands. That is why this protocol is most often used for a residential or open Wi-Fi network.

(b)

1.Secret Key Cryptography, or symmetric cryptography - it uses a single key to encrypt data. Both encryption and decryption in symmetric cryptography use the same key, making this the easiest form of cryptography. 

2Public Key Cryptography, or asymmetric cryptography -it uses two keys to encrypt data. One is used for encryption, while the other key can be used to decrypt the message. Unlike symmetric cryptography, if one key is used to encrypt, that same key cannot decrypt the message, rather the other key shall be used.

3.Hash functions - these are irreversible, one-way functions which protect the data, at the cost of not being able to recover the original message. Hashing is a way to transform a given string into a fixed length string. A good hashing algorithm will produce unique outputs for each input given







Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Comments

No comments. Be the first!

Leave a comment

LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS