beautypg.com

Encryption and authorization algorithm overview – AML MT7570 Vehicle Mount Computer User Manual

Page 68

background image

Encryption & Algorithm Overview

USER’S GUIDE

MT7570 Vehicle Mount Terminal

Encryption and Authorization Algorithm Overview

Before setting up any kind of wireless infrastructure or installing new devices within an existing site, it is a

good idea to fully understand the technology. The following is a brief explanation of wireless security

terms and how they relate to the MT7570 and other AML products.

WEP

WPA

WPA2

Wired Equivalent

Privacy

Wifi Protected Access

Wifi Protected Access

Version 2

WEP was initially intended to provide a level of confidentiality on a wireless

network that was comparable to a wired infrastructure. WEP does not allow for

any true authorization (only encryption) and does not protect users or devices

from each other on the network. There are two main WEP types: WEP Open

System (Standard WEP) – All data transmissions are encrypted with the WEP

key. No attempt is made to authorize the client device. WEP Shared Key – In

Shared Key, a very insecure attempt to authorize the device is attempted. The

actual WEP encryption key is sent to the host (usually the access point) to verify

the identity of the device. This exposes the enciphering key to the network, and

should not be used. In a WEP enabled environment, each client holds the

common network encryption keys which can be either a 40-bit key for 64-bit

encryption or a 104-bit key for 128-bit encryption. These keys are common to all

devices on the network and are used to encrypt all data transmissions. Because

each network packet is encrypted with the same key, and because of flaws in the

actual cipher, WEP is no longer considered secure, and an attacker, depending

on network traffic, could determine the network encryption keys by eavesdrop-

ping on the transmissions. It has been demonstrated in a controlled environment

that these attacks can take as little as 10 minutes to determine a 40-bit key.
WPA was created in response to the weaknesses of WEP, and while it imple-

ments the majority of the IEEE 802.11i standard, it is not considered to be fully

compliant. WPA was only intended as a temporary measure to be used in place

of WEP while the final 802.11i standard was being drafted.

WPA was designed to work on all existing 802.11 hardware to provide a consid-

erable amount of protection compared to WEP.

WPA was designed for use with an 802.1x (commonly referred to as RADIUS)

server to provide authentication and to distribute encryption keys to the clients. It

is possible, however, to use WPA in “Personal” Pre-shared key (PSK) mode

which allows the benefits of WPA without the need of the external 802.1x server,

but this is considered to be less secure. Each client in a PSK environment holds

a common passphrase that is used to generate the keys. Weak passphrases are

major concerns when using PSK. One major improvement in WPA over WEP is

the Temporal Key Integrity Protocol (TKIP), which dynamically changes keys as

the system is used. The more often that the encryption key changes, the less

data a potential attacker can get on the key; even if they were to determine the

current key, once a new key was rotated in, they would be de-authenticated

again. WPA also defined the use of EAP for authentication of users, however it

does not define all of the EAP types that are employed in WPA2.
WPA2 contains the following components: 802.1x for authentication (entailing the

use of EAP and an authentication server), RSN (Robust Security Network) for

keeping track of associations, and AES-based CCMP encryption to provide

confidentiality, integrity and origin authentication.