Page 200 - StudyBook.pdf
P. 200

184    Chapter 4 • Communication Security: Wireless

             tion to the functionality of the 802.11 standard, including a standard definition of
             WEP, the privacy created, and the authentication.
                 WEP provides security and privacy in transmissions held between the AP and
             the clients.To gain access, an intruder must be more sophisticated and have specific
             intent to gain access. Some of the other benefits of implementing WEP include the
             following:

                  ■   All messages are encrypted using a CRC-32 checksum to provide some
                      degree of integrity.

                  ■   Privacy is maintained via the RC4 encryption.Without possession of the
                      secret key, the message cannot be easily decrypted.

                  ■   WEP is extremely easy to implement.All that is required is to set the
                      encryption key on the APs and on each client.
                  ■   WEP provides a basic level of security for WLAN applications.
                  ■   WEP keys are user-definable and unlimited.WEP keys can, and should, be
                      changed often.




              EXAM WARNING
                  Do not confuse WAP and WEP. While it may seem that WEP is the pri-
                  vacy system for WAP, you should remember that WTLS is the privacy
                  mechanism for WAP and WEP is the privacy mechanism for 802.11
                  WLANs.





             Creating Privacy with WEP

             WEP provides for three implementations: no encryption, 40-bit encryption, and
             128-bit encryption. Clearly, no encryption means no privacy.When WEP is set to
             no encryption, transmissions are sent in the clear and can be viewed by any wireless
             sniffing application that has access to the RF signal propagated in the WLAN
             (unless some other encryption mechanism, such as IPSec, is being used). In the case
             of the 40- and 128-bit varieties (just as with password length), the greater the
             number of characters (bits), the stronger the encryption.The initial configuration of
             the AP includes the setup of the shared key.This shared key can be in the form of
             either alphanumeric or hexadecimal strings, and must be matched on the client.



          www.syngress.com
   195   196   197   198   199   200   201   202   203   204   205