+ Post New Thread
Page 2 of 2 FirstFirst 12
Results 16 to 18 of 18
Internet Related/Filtering/Firewall Thread, Which encryption for wireless? in Technical; Originally Posted by jjx Here's a quick overview for you... For the full scoop, check out "A Brief History of ...
  1. #16

    mac_shinobi's Avatar
    Join Date
    Aug 2005
    Posts
    10,051
    Thank Post
    3,583
    Thanked 1,123 Times in 1,025 Posts
    Rep Power
    377
    Quote Originally Posted by jjx View Post
    Here's a quick overview for you...
    For the full scoop, check out "A Brief History of Wireless Security" at Security Uncorked A Brief History of Wireless Security

    KNOWING YOUR NEED
    It really depends on the data you need to protect. In the US, we have specific regulations over data protection for personal information, health and financial. A school network could contain:
    - Student grades, names, gov ID, addresses <- Personal info
    - Student health information (mental/clinical) <- Health info
    - Employee names, addresses, gov ID <- Personal info
    - Employee health or insurance info <- Health info
    - Employee salary and benefits <- Financial data

    THREE MINUTE OVERVIEW
    Listed most secure to least secure.

    1. Enterprise mode 802.11i (WPA2 with 802.1X and AES) > Connects to directory services to authenticate users or machines and uses 802.1X for key rotation. Not currently broken because the encryption is secure (AES) and the key rotation (802.1X) is not broken.

    2. WPA or WPA2 with TKIP > Can be broken, but takes much more effort and the keys isn't broken, the checksum is. The vulnerability is in the TKIP encryption (vs AES). TKIP was an interim crypto method before all hardware could support AES.

    3. WPA2 with PSK > Uses a pre-shared key instead of rotating keys created by 802.1X. Pre-shared keys are more vulnerable, especially when not configured to rotate at all. Even rotating PSKs are not as secure as 802.1X keys.

    4. WEP with PSK > Just don't even do it.

    -jj
    Can see your list from top to bottom but you did put vs AES for the WPA or WPA 2 so how would item 2 compare with WPA or WPA 2 using AES ( if this is possible ) ?

  2. #17

    Edu-IT's Avatar
    Join Date
    Nov 2007
    Posts
    7,452
    Thank Post
    408
    Thanked 671 Times in 613 Posts
    Rep Power
    192
    I think WPA2 AES is the best we're going to get then, with AD authentication for laptops not connected to the domain/if no AD credentials available then guest access.

    What would the key length ideally be? (Random words/numbers)

  3. #18

    Join Date
    May 2010
    Location
    England
    Posts
    118
    Thank Post
    21
    Thanked 20 Times in 17 Posts
    Rep Power
    13
    Heya EDU-IT

    Key length - the longer the better security wise. i don't think there is a maximum (but i could be wrong), i would suggest a minimum of 10 character, and most importantly make sure that your including letters, number and symbols too!

    Hope this helps! ^_^

    Regards

    Koryo

  4. Thanks to koryo from:

    Edu-IT (13th October 2010)



SHARE:
+ Post New Thread
Page 2 of 2 FirstFirst 12

Similar Threads

  1. VOIP Encryption
    By matt40k in forum Wireless Networks
    Replies: 0
    Last Post: 29th January 2009, 06:04 PM
  2. Question about encryption
    By sidewinder in forum How do you do....it?
    Replies: 9
    Last Post: 28th November 2008, 12:57 PM
  3. Encryption
    By ScottStevinson in forum How do you do....it?
    Replies: 4
    Last Post: 14th July 2008, 10:27 AM
  4. Powerpoint encryption
    By roty80 in forum Educational Software
    Replies: 0
    Last Post: 6th May 2008, 12:53 PM

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •