However, these tests where purely experimental and no easy-to-use tools were available to the public at the time. If the WPA is appropriately implemented and sufficiently managed, it will be a very strong security and highly difficult task ofbreaking; especially with the implementation of the AES-CCMP, whichis the most secure wireless network configuration in use today.
The Station encrypts this text with the WEP secret key, sends it back to the AP which decrypts the text, checks if it is the correct one and then grants access to the network.
Throughout this time, institutions used VPNs as an alternative security solution to secure their wireless networks Dowt, According to Alikira, a network administrator KIU, WEP is easy to configure and also provides an option that does not require the client to even login and it is supported by most wireless devices and routers unlike WPA and WPA2 which are new and therefore not supported by some old laptops interview, Based on similar thesis Takahashi developed a tool called WPAcrack, a proof of concept which allows a brute force offline dictionary attack against the WPA.
The encryption mechanisms were evaluated basing on literature and measurement of association time. Therefore, the main focus of this study will be to examine different encryption methods and to identify potential risks when using wireless networks and recommend possible means of securing WLANs.
However, this approach does not provide the desired security as it is easy to spoof an address. The security vulnerabilities that exist in them are analyzed and explained.