ZyXEL M-302 Manual Do Utilizador

Página de 81
M-302 User’s Guide
76
Appendix C
The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data 
packets, altering them and resending them. The MIC provides a strong mathematical function 
in which the receiver and the transmitter each compute and then compare the MIC. If they do 
not match, it is assumed that the data has been tampered with and the packet is dropped. 
By generating unique data encryption keys for every data packet and by creating an integrity 
checking mechanism (MIC), with TKIP and AES it is more difficult to decrypt data on a Wi-Fi 
network than WEP and difficult for an intruder to break into the network. 
The encryption mechanisms used for WPA and WPA-PSK are the same. The only difference 
between the two is that WPA-PSK uses a simple common password, instead of user-specific 
credentials. The common-password approach makes WPA-PSK susceptible to brute-force 
password-guessing attacks but it’s still an improvement over WEP as it employs a consistent, 
single, alphanumeric password to derive a PMK which is used to generate unique temporal 
encryption keys. This prevent all wireless devices sharing the same encryption keys. (a 
weakness of WEP)
User Authentication 
WPA applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate 
wireless stations using an external RADIUS database.
WPA-PSK Application Example
A WPA-PSK application looks as follows.
First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key 
(PSK) must consist of between 8 and 63 ASCII characters or 64 hexadecimal characters 
(including spaces and symbols).
The AP checks each client's password and (only) allows it to join the network if it 
matches its password.
The AP and wireless clients use the pre-shared key to generate a common PMK.
The AP and wireless clients use the TKIP or AES encryption process to encrypt data 
exchanged between them.