2005 Auguste / Mazdak Allayari
__________________________________
-Lan authentication
WPA : Wi-Fi Protected Access (WPA and WPA2) is
a class of systems to secure wireless (Wi-Fi) computer networks.
In the "Personal" mode, the
most likely choice for homes and small offices, a passphrase is required.
it can
also be used in a with/less secure "pre-shared key" (PSK) mode.
-Data
ciphering (Encryption)
WEP : Wired Equivalent Privacy
or Wireless Encryption pejim (WEP) is a scheme to
secure IEEE 802.11
wireless networks. It is part of the IEEE 802.11
wireless networking standard. Wireless networks broadcast
messages using radio,
so are more susceptible to eavesdropping than wired networks.
WEP was intended to provide confidentiality
comparable to that of a traditional wired network. Several serious weaknesses were
identified by cryptanalysts; a WEP connection can be cracked
with readily available software within minutes. WEP was superseded by Wi-Fi Protected Access (WPA) in 2003, followed by the full
IEEE 802.11i
standard (also known as WPA2) in 2004. Despite its weaknesses, WEP provides a level of security
that may deter casual snooping.
TKIP : Temporal Key Integrity Protocol,
is a security protocol used in Wi-Fi Protected Access (WPA).
AES : cryptography, the Advanced Encryption
Standard (AES),
also known as Rijndael, is a block cipher adopted as an encryption
standard by the
CCMP : Counter Mode with Cipher Block Chaining
Message Authentication Code Protocol, is an IEEE 802.11i encryption protocol,
created
to replace, together with TKIP, an earlier, insecure WEP protocol.
-Type authentication
:
EAP-SIM : Extensible
Authentication Protocol Method for GSM Subscriber Identity,
is an
Extensible Authentication Protocol (EAP) mechanism for authentication and
session key distribution using the Global System for
Mobile
Communications (GSM) Subscriber Identity Module (SIM). EAP-SIM is
described in RFC 4186.
TLS : Transport Layer Security and its
predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that
provide secure communications
on the
Internet for such things as web browsing, e-mail, Internet faxing, instant
messaging and other data transfers.
TTLS : Tunnelled Transport
Layer Security, It was co-developed by Funk Software and Certicom.
It is widely supported across platforms,
and
offers very good security. The client does not need be authenticated via a
CA-signed PKI certificate to the server,
but only the
server to the client. This greatly simplifies the setup procedure as a
certificate does not need to be installed on every client.
LEAP : Lightweight Extensible Authentication
Protocol is a proprietary wireless LAN authentication method developed by Cisco
Systems.
PEAP : Extensible Authentication Protocol,
Protected EAP, or simply (pronounced "peep"),
is a
method to securely transmit authentication information, including passwords,
over wired or wireless networks.
EAP : Extensible Authentication Protocol, is a
universal authentication framework frequently used in wireless networks
and
Point-to-Point connections. It is defined by RFC 3748.
Protocol
Authentication :
PEAPv1/EAP-GTC
:
Was created by Cisco as an alternative to PEAPv0/EAP-MSCHAPv2.
It allows the use of an inner
authentication protocol other than Microsoft's MSCHAPv2.
EAP-GTC (Generic Token Card) is
defined in RFC 3748.