What is WPA2 (WiFi Protected Access 2)?
WPA2 provides business and home WiFi users with a high degree of assurance that only authorized users can access their wireless network.
Based on the IEEE 802.11i standard, WPA2 provides government-grade security by implementing the National Institute of Standards and Technology (NIST) FIPS 140-2 compliant AES encryption algorithm FIPS 140-2, same 802.1x-based authentication.
What is WPA2 (WiFi Protected Access 2)? Picture 1
There are two versions of WPA2: WPA2-Personal and WPA2-Enterprise:
- WPA2-Personal protects against unauthorized network access using a set password.
- WPA2-Enterprise verifies network users through a server. WPA2 is backward compatible with WPA.
Vulnerability discovered in WPA2 . protocol
On October 16, 2017, security researchers disclosed a high-severity vulnerability in the WPA2 protocol, making it possible for attackers to eavesdrop on WiFi traffic passing between computers and other devices. access point.
What is WPA2 (WiFi Protected Access 2)? Picture 2
The Proof-Of-Concept exploit attack known as KRACK (Key Reinstallation Attacks) affects the core WPA2 protocol itself and is effective against devices running Android, Linux, Apple, Windows and OpenBSD operating systems, as well as MediaTek Linksys and many other types of operating systems running on the devices. Vendors then provided patches and updates to users to fix this vulnerability.
You should read it
- Wifi security: should use WPA2-AES, WPA2-TKIP or both?
- KRACK attack breaks down the WPA2 WiFi protocol
- How to hack WiFi passwords with holes on WPA / WPA2
- Compare 4 types of security WiFi WEP, WPA, WPA2 and WPA3
- How to Hack Wi Fi WPA/WPA2 with Kali Linux
- Switch to WPA / WPA2-Enterprise encryption
- Microsoft silently patched the KRACK WPA2 security hole
- Learn about WPA3, the latest WiFi security standard today
- Deploy WPA2-Enterprise wireless security in small businesses
- How to set up WEP, WPA, WPA2 for Linksys router
- Upgrade Wi-Fi security from WEP to WPA2
- Setting up Wi-Fi authentication in Windows Server 2008 - Part 1
May be interested
Learn about MediaTek Helio P22T chip
What is the difference between PCIe 3.0, PCIe 4.0 and PCIe 5.0?
What is AAE file in iPhone? Can it be deleted?
What's the difference between 16-bit, 24-bit and 32-bit audio?
What is LDAC? How does it affect wireless audio streaming quality?
What is the BIOS Quick Flash button on the motherboard? How does it work?