WPA/ WPA2 PSK works by basically deriving a per-session key, called Pair-wise Transient Key (PTK), that is derived from the following factors: Both WPA and WPA2 are vulnerable to dictionary attacks, to execute which one needs the four-way WPA handshake between the client and the access point and a dictionary that must contain the passphrase. WPA2 uses the AES-CCMP algorithm for encryption, which is more powerful and robust compared to TKIP. Hence WPA also uses the TKIP encryption algorithm, similar to WEP. WPA (Wi-Fi Protected Access) was designed to be an immediate patch to the failings of WEP (Wired Equivalent Privacy) without demanding hardware changes in devices that already ran on WEP.
0 Comments
Leave a Reply. |