Page 250 - StudyBook.pdf
P. 250

234    Chapter 4 • Communication Security: Wireless


              NOTE

                  To add to the confusion, MIC is variously referred to as Message
                  Integrity Code or Message Integrity Check. As with TKIP, MIC is a tech-
                  nology originally developed by Cisco (which uses the term “Check”) for
                  use in its products, and is not widely available at the time of this
                  writing.





             IEEE 802.11i Standard

             The negative response to the weaknesses of WEP has been vociferous and strong.
             To address the criticisms leveled at WEP and to provide a stronger standards-based
             security mechanism that vendors can implement in their products, the IEEE
             802.11i task group is working on the upcoming 802.11i standard.Although the
             standard is not finalized, some things about its final form are fairly certain.The
             standard will take the best of the technology available today for securing wireless
             networks and combine them into a single, coherent standard.The following are
             expected to be included in the standard:

                  ■   The 802.11i standard will require the use of 802.1X authentication based
                      on EAP.

                  ■   The 802.11i standard will also likely require the use of TKIP and MIC.
                  ■   For new devices, the 802.11i standard will also require the use of
                      Advanced Encryption Standard (AES) as a replacement for the compro-
                      mised RC4 algorithm.

                 AES provides much stronger encryption than RC4. However, because of the
             additional processing power required for AES encryption, the addition of a co-pro-
             cessor will likely be necessary in wireless device hardware.When this technology
             becomes available in the marketplace, replacing legacy wireless devices could result
             in a significant expenditure.As with all other security measures, administrators and
             managers will have to compare the costs of implementation against the threats the
             implementation will mitigate.











          www.syngress.com
   245   246   247   248   249   250   251   252   253   254   255