Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

Wi-Fi Protected Access

Index Wi-Fi Protected Access

Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. [1]

63 relations: Address Resolution Protocol, Advanced Encryption Standard, Aircrack-ng, Android (operating system), ASCII, Asus, Broadcasting (networking), CBC-MAC, CCMP (cryptography), Cyclic redundancy check, Denial-of-service attack, Extensible Authentication Protocol, Firmware, Forward secrecy, FreeRADIUS, Hexadecimal, HMAC, Hostapd, IEEE 802.11e-2005, IEEE 802.11i-2004, IEEE 802.1X, Institute of Electrical and Electronics Engineers, Internet Authentication Service, JavaScript, John Wiley & Sons, Juniper Networks, Key (cryptography), Key derivation function, KRACK, LEDE, Man-in-the-middle attack, MediaTek, Message authentication code, Moxie Marlinspike, MS-CHAP, National Institute of Standards and Technology, OpenWrt, Passphrase, Password cracking, Password strength, Patch (computing), PBKDF2, Personal identification number, Port scanner, Pre-shared key, Protected Extensible Authentication Protocol, Quality of service, RADIUS, Rainbow table, Random number generation, ..., RC4, Salt (cryptography), SHA-1, Spoofing attack, Temporal Key Integrity Protocol, Transmission Control Protocol, Transport Layer Security, Unicast, Wi-Fi Alliance, Wi-Fi Protected Setup, Wired Equivalent Privacy, Wireless access point, Wireless network interface controller. Expand index (13 more) »

Address Resolution Protocol

The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given network layer address, typically an IPv4 address.

New!!: Wi-Fi Protected Access and Address Resolution Protocol · See more »

Advanced Encryption Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

New!!: Wi-Fi Protected Access and Advanced Encryption Standard · See more »

Aircrack-ng

Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.

New!!: Wi-Fi Protected Access and Aircrack-ng · See more »

Android (operating system)

Android is a mobile operating system developed by Google, based on a modified version of the Linux kernel and other open source software and designed primarily for touchscreen mobile devices such as smartphones and tablets.

New!!: Wi-Fi Protected Access and Android (operating system) · See more »

ASCII

ASCII, abbreviated from American Standard Code for Information Interchange, is a character encoding standard for electronic communication.

New!!: Wi-Fi Protected Access and ASCII · See more »

Asus

AsusTek Computer Inc. (stylised as ASUSTeK or ΛSUS) is a Taiwanese multinational computer and phone hardware and electronics company headquartered in Beitou District, Taipei, Taiwan.

New!!: Wi-Fi Protected Access and Asus · See more »

Broadcasting (networking)

In computer networking, telecommunication and information theory, broadcasting is a method of transferring a message to all recipients simultaneously.

New!!: Wi-Fi Protected Access and Broadcasting (networking) · See more »

CBC-MAC

In cryptography, a cipher block chaining message authentication code (CBC-MAC) is a technique for constructing a message authentication code from a block cipher.

New!!: Wi-Fi Protected Access and CBC-MAC · See more »

CCMP (cryptography)

Counter Mode Cipher Block Chaining Message Authentication Code Protocol, Counter Mode CBC-MAC Protocol or simply CCMP (CCM mode Protocol) is an encryption protocol designed for Wireless LAN products that implements the standards of the IEEE 802.11i amendment to the original IEEE 802.11 standard.

New!!: Wi-Fi Protected Access and CCMP (cryptography) · See more »

Cyclic redundancy check

A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data.

New!!: Wi-Fi Protected Access and Cyclic redundancy check · See more »

Denial-of-service attack

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

New!!: Wi-Fi Protected Access and Denial-of-service attack · See more »

Extensible Authentication Protocol

Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and point-to-point connections.

New!!: Wi-Fi Protected Access and Extensible Authentication Protocol · See more »

Firmware

In electronic systems and computing, firmware is a specific class of computer software that provides the low-level control for the device's specific hardware.

New!!: Wi-Fi Protected Access and Firmware · See more »

Forward secrecy

In cryptography, forward secrecy (FS), also known as perfect forward secrecy (PFS), is a feature of specific key agreement protocols that gives assurances your session keys will not be compromised even if the private key of the server is compromised.

New!!: Wi-Fi Protected Access and Forward secrecy · See more »

FreeRADIUS

FreeRADIUS is a modular, high performance free RADIUS suite developed and distributed under the GNU General Public License, version 2, and is free for download and use.

New!!: Wi-Fi Protected Access and FreeRADIUS · See more »

Hexadecimal

In mathematics and computing, hexadecimal (also base, or hex) is a positional numeral system with a radix, or base, of 16.

New!!: Wi-Fi Protected Access and Hexadecimal · See more »

HMAC

In cryptography, an HMAC (sometimes disabbreviated as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key.

New!!: Wi-Fi Protected Access and HMAC · See more »

Hostapd

hostapd is a user space daemon for wireless access point and authentication servers.

New!!: Wi-Fi Protected Access and Hostapd · See more »

IEEE 802.11e-2005

IEEE 802.11e-2005 or 802.11e is an approved amendment to the IEEE 802.11 standard that defines a set of quality of service (QoS) enhancements for wireless LAN applications through modifications to the Media Access Control (MAC) layer.

New!!: Wi-Fi Protected Access and IEEE 802.11e-2005 · See more »

IEEE 802.11i-2004

IEEE 802.11i-2004, or 802.11i for short, is an amendment to the original IEEE 802.11, implemented as Wi-Fi Protected Access II (WPA2).

New!!: Wi-Fi Protected Access and IEEE 802.11i-2004 · See more »

IEEE 802.1X

IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC).

New!!: Wi-Fi Protected Access and IEEE 802.1X · See more »

Institute of Electrical and Electronics Engineers

The Institute of Electrical and Electronics Engineers (IEEE) is a professional association with its corporate office in New York City and its operations center in Piscataway, New Jersey.

New!!: Wi-Fi Protected Access and Institute of Electrical and Electronics Engineers · See more »

Internet Authentication Service

Internet Authentication Service (IAS) is a component of Windows Server operating systems that provides centralized user authentication, authorization and accounting.

New!!: Wi-Fi Protected Access and Internet Authentication Service · See more »

JavaScript

JavaScript, often abbreviated as JS, is a high-level, interpreted programming language.

New!!: Wi-Fi Protected Access and JavaScript · See more »

John Wiley & Sons

John Wiley & Sons, Inc., also referred to as Wiley, is a global publishing company that specializes in academic publishing.

New!!: Wi-Fi Protected Access and John Wiley & Sons · See more »

Juniper Networks

Juniper Networks, Inc. is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products.

New!!: Wi-Fi Protected Access and Juniper Networks · See more »

Key (cryptography)

In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.

New!!: Wi-Fi Protected Access and Key (cryptography) · See more »

Key derivation function

In cryptography, a key derivation function (KDF) derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function.

New!!: Wi-Fi Protected Access and Key derivation function · See more »

KRACK

KRACK ("Key Reinstallation Attack") is a severe replay attack (a type of exploitable flaw) on the Wi-Fi Protected Access protocol that secures Wi-Fi connections.

New!!: Wi-Fi Protected Access and KRACK · See more »

LEDE

The Linux Embedded Development Environment (LEDE) project is founded as a fork of the OpenWrt project and shares many of the same goals.

New!!: Wi-Fi Protected Access and LEDE · See more »

Man-in-the-middle attack

In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

New!!: Wi-Fi Protected Access and Man-in-the-middle attack · See more »

MediaTek

MediaTek Inc. is a Taiwanese fabless semiconductor company that provides chips for wireless communications, High-definition television, handheld mobile devices like smartphones and tablet computers, navigation systems, consumer multimedia products and Digital subscriber line services as well as optical disc drives.

New!!: Wi-Fi Protected Access and MediaTek · See more »

Message authentication code

In cryptography, a message authentication code (MAC), sometimes known as a tag, is a short piece of information used to authenticate a message—in other words, to confirm that the message came from the stated sender (its authenticity) and has not been changed.

New!!: Wi-Fi Protected Access and Message authentication code · See more »

Moxie Marlinspike

Matthew Rosenfield, known as Moxie Marlinspike, is an American computer security researcher, whose research focuses primarily on techniques for intercepting communication, as well as methods for strengthening communication infrastructure against interception.

New!!: Wi-Fi Protected Access and Moxie Marlinspike · See more »

MS-CHAP

MS-CHAP is the Microsoft version of the Challenge-Handshake Authentication Protocol, CHAP.

New!!: Wi-Fi Protected Access and MS-CHAP · See more »

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.

New!!: Wi-Fi Protected Access and National Institute of Standards and Technology · See more »

OpenWrt

OpenWrt is an open source project for embedded operating system based on Linux, primarily used on embedded devices to route network traffic.

New!!: Wi-Fi Protected Access and OpenWrt · See more »

Passphrase

A passphrase is a sequence of words or other text used to control access to a computer system, program or data.

New!!: Wi-Fi Protected Access and Passphrase · See more »

Password cracking

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system.

New!!: Wi-Fi Protected Access and Password cracking · See more »

Password strength

Password strength is a measure of the effectiveness of a password against guessing or brute-force attacks.

New!!: Wi-Fi Protected Access and Password strength · See more »

Patch (computing)

A patch is a set of changes to a computer program or its supporting data designed to update, fix, or improve it.

New!!: Wi-Fi Protected Access and Patch (computing) · See more »

PBKDF2

In cryptography, PBKDF1 and PBKDF2 (Password-Based Key Derivation Function 2) are key derivation functions with a sliding computational cost, aimed to reduce the vulnerability of encrypted keys to brute force attacks.

New!!: Wi-Fi Protected Access and PBKDF2 · See more »

Personal identification number

A personal identification number (PIN, pronounced "pin"; is often spoken out loud "PIN number" by mistake) is a numeric or alpha-numeric password or code used in the process of authenticating or identifying a user to a system and system to a user.

New!!: Wi-Fi Protected Access and Personal identification number · See more »

Port scanner

A port scanner is an application designed to probe a server or host for open ports.

New!!: Wi-Fi Protected Access and Port scanner · See more »

Pre-shared key

In cryptography, a pre-shared key (PSK) is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used.

New!!: Wi-Fi Protected Access and Pre-shared key · See more »

Protected Extensible Authentication Protocol

The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel.

New!!: Wi-Fi Protected Access and Protected Extensible Authentication Protocol · See more »

Quality of service

Quality of service (QoS) is the description or measurement of the overall performance of a service, such as a telephony or computer network or a cloud computing service, particularly the performance seen by the users of the network.

New!!: Wi-Fi Protected Access and Quality of service · See more »

RADIUS

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol, operating on port 1812 that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service.

New!!: Wi-Fi Protected Access and RADIUS · See more »

Rainbow table

A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes.

New!!: Wi-Fi Protected Access and Rainbow table · See more »

Random number generation

Random number generation is the generation of a sequence of numbers or symbols that cannot be reasonably predicted better than by a random chance, usually through a hardware random-number generator (RNG).

New!!: Wi-Fi Protected Access and Random number generation · See more »

RC4

In cryptography, RC4 (Rivest Cipher 4 also known as ARC4 or ARCFOUR meaning Alleged RC4, see below) is a stream cipher.

New!!: Wi-Fi Protected Access and RC4 · See more »

Salt (cryptography)

In cryptography, a salt is random data that is used as an additional input to a one-way function that "hashes" data, a password or passphrase.

New!!: Wi-Fi Protected Access and Salt (cryptography) · See more »

SHA-1

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long.

New!!: Wi-Fi Protected Access and SHA-1 · See more »

Spoofing attack

In the context of network security, a spoofing attack is a situation in which a person or program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.

New!!: Wi-Fi Protected Access and Spoofing attack · See more »

Temporal Key Integrity Protocol

Temporal Key Integrity Protocol or TKIP is a security protocol used in the IEEE 802.11 wireless networking standard.

New!!: Wi-Fi Protected Access and Temporal Key Integrity Protocol · See more »

Transmission Control Protocol

The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite.

New!!: Wi-Fi Protected Access and Transmission Control Protocol · See more »

Transport Layer Security

Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.

New!!: Wi-Fi Protected Access and Transport Layer Security · See more »

Unicast

200px In computer networking, unicast refers to a one-to-one transmission from one point in the network to another point; that is, one sender and one receiver, each identified by a network address.

New!!: Wi-Fi Protected Access and Unicast · See more »

Wi-Fi Alliance

Wi-Fi Alliance is a non-profit organization that promotes Wi-Fi technology and certifies Wi-Fi products if they conform to certain standards of interoperability.

New!!: Wi-Fi Protected Access and Wi-Fi Alliance · See more »

Wi-Fi Protected Setup

Wi-Fi Protected Setup (WPS; originally, Wi-Fi Simple Config) is a network security standard to create a secure wireless home network.

New!!: Wi-Fi Protected Access and Wi-Fi Protected Setup · See more »

Wired Equivalent Privacy

Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks.

New!!: Wi-Fi Protected Access and Wired Equivalent Privacy · See more »

Wireless access point

20018 In computer networking, a wireless access point (WAP), or more generally just access point (AP), is a networking hardware device that allows a Wi-Fi device to connect to a wired network.

New!!: Wi-Fi Protected Access and Wireless access point · See more »

Wireless network interface controller

A wireless network interface controller (WNIC) is a network interface controller which connects to a wireless radio-based computer network, rather than a wired network, such as Token Ring or Ethernet.

New!!: Wi-Fi Protected Access and Wireless network interface controller · See more »

Redirects here:

WPA key, WPA security, WPA-Enterprise, WPA-PSK, WPA-Personal, WPA2, WPA3, Wi-Fi Protected Access II, WiFi Protection Access, Wifi Protected Access, Wifi protected access 2, Wireless Protected Access, Wpa2.

References

[1] https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access

OutgoingIncoming
Hey! We are on Facebook now! »