2005 Auguste / Mazdak Allayari

__________________________________

 

 

-Lan authentication

   WPA     : Wi-Fi Protected Access (WPA and WPA2) is a class of systems to secure wireless (Wi-Fi) computer networks.

             In the "Personal" mode, the most likely choice for homes and small offices, a passphrase is required.

             it can also be used in a with/less secure "pre-shared key" (PSK) mode.

 

-Data ciphering (Encryption)

   WEP     : Wired Equivalent Privacy or Wireless Encryption pejim (WEP) is a scheme to secure IEEE 802.11 wireless networks. It is part of the IEEE 802.11 wireless networking standard. Wireless networks broadcast messages using radio, so are more susceptible to eavesdropping than wired networks.

WEP was intended to provide confidentiality comparable to that of a traditional wired network. Several serious weaknesses were identified by cryptanalysts; a WEP connection can be cracked with readily available software within minutes. WEP was superseded by Wi-Fi Protected Access (WPA) in 2003, followed by the full IEEE 802.11i standard (also known as WPA2) in 2004. Despite its weaknesses, WEP provides a level of security that may deter casual snooping.

 

   TKIP    : Temporal Key Integrity Protocol, is a security protocol used in Wi-Fi Protected Access (WPA).

   AES     : cryptography, the Advanced Encryption Standard (AES),

             also known as Rijndael, is a block cipher adopted as an encryption standard by the U.S. government.

   CCMP    : Counter Mode with Cipher Block Chaining Message Authentication Code Protocol, is an IEEE 802.11i encryption protocol,

             created to replace, together with TKIP, an earlier, insecure WEP protocol.

 

 

 

-Type authentication :

   EAP-SIM : Extensible Authentication Protocol Method for GSM Subscriber Identity,

             is an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Global System for

             Mobile Communications (GSM) Subscriber Identity Module (SIM). EAP-SIM is described in RFC 4186.

   TLS     : Transport Layer Security and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide secure communications

             on the Internet for such things as web browsing, e-mail, Internet faxing, instant messaging and other data transfers.

   TTLS    : Tunnelled Transport Layer Security, It was co-developed by Funk Software and Certicom. It is widely supported across platforms,

             and offers very good security. The client does not need be authenticated via a CA-signed PKI certificate to the server,

             but only the server to the client. This greatly simplifies the setup procedure as a certificate does not need to be installed on every client.

 

   LEAP    : Lightweight Extensible Authentication Protocol is a proprietary wireless LAN authentication method developed by Cisco Systems.

   PEAP    : Extensible Authentication Protocol, Protected EAP, or simply (pronounced "peep"),

             is a method to securely transmit authentication information, including passwords, over wired or wireless networks.

   EAP     : Extensible Authentication Protocol, is a universal authentication framework frequently used in wireless networks

              and Point-to-Point connections. It is defined by RFC 3748.

 

Protocol Authentication :

   PEAPv1/EAP-GTC

           :  Was created by Cisco as an alternative to PEAPv0/EAP-MSCHAPv2.

              It allows the use of an inner authentication protocol other than Microsoft's MSCHAPv2.

              EAP-GTC (Generic Token Card) is defined in RFC 3748.