WPA3在2018年为无线安全添砖加瓦

WPA3在2018年为无线安全添砖加瓦Wi-FiAllianceAnnouncesWPA3,theSuccessortoWi-Fi’sWPA2SecurityProtocolTheWi-FiAlliance–comprising15majorsponsormembers(includingApple,Cisco,Dell,Intel,Microsoft,Qualcomman

大家好,又见面了,我是你们的朋友全栈君。

Wi-Fi Alliance Announces WPA3, the Successor to Wi-Fi’s WPA2 Security Protocol

The Wi-Fi Alliance — comprising 15 major sponsor members (including Apple, Cisco, Dell, Intel, Microsoft, Qualcomm and more) and hundreds of contributing members — has announced that WPA3 will be introduced during 2018. 

WPA3 is not an immediate replacement for WPA2, which will continue to be maintained and enhanced. In particular, the Alliance will introduce new testing enhancements for WPA2 to reduce the potential for vulnerabilities caused by network misconfigurations; and will further safeguard managed networks with centralized authentication services.

New Wi-Fi Alliance WPA3 certified devices will take some time to filter into widespread use. Use of the new specification will require WPA3 devices and WPA3 routers — and since the vast majority of home wi-fi users never buy a router but use the one supplied by their ISP, many users won’t become WPA3 compatible before they change ISPs. That could take several years.

WPA3 Security ProtocolNevertheless, there are some welcome enhancements over the WP2 specification that has kept users largely, but not entirely, protected for around two decades.

Four new capabilities for both personal and enterprise networks have been announced. There are no technical details in the Wi-Fi announcement, leading to some conjecture over exactly how they will be introduced.

The first will be to provide “robust protections” even when the user fails to use a strong password. Mathy Vanhoef, the researcher who discovered the KRACK WPA2 vulnerability, has suggested on Twitter, “That means dictionary attacks no longer work. The handshake they’re referring to is likely Simultaneous Authentication of Equals (SAE). Which is also called Dragonfly;” adding, “The standards behind WPA3 already existed for a while. But now devices are  *required* to support them, otherwise they’re won’t receive the “WPA3-certified” label.”

The second will simplify the process of configuring security on wi-fi devices that have limited or no display interface. The obvious use will be for small personal devices, like wearables such as smart watches — but it could also play some role in improving the future security of the industrial internet of things.

The third will improve the security of open wi-fi hotspots — such as cafes, hotels and airport lounges — by giving each user individualized data encryption. On this, Vanhoef commented, “This might refer to Opportunistic Wireless Encryption: encryption without authentication.” It won’t make the use of wi-fi hotspots completely secure, but should go some way to reassuring security officers who know that corporate employees work from hotspots while traveling.

The fourth will be a 192-bit security suite aligned with the Commercial National Security Algorithm (CNSA) Suite, that will further protect wi-fi networks with higher security requirements; such as government, defense, and industrial.

We can expect that new WPA3 devices will start to appear over the next few months — particularly since many of the manufacturers will be members of the Alliance. However, the devices will need wait for the launch of the Wi-Fi Alliance’s formal certification process before they can be truly called such. The Wi-Fi Certified designation will be important to reassure buyers.

“Security is a foundation of Wi-Fi Alliance certification programs, and we are excited to introduce new features to the Wi-Fi CERTIFIED family of security solutions,” commented Edgar Figueroa, president and CEO of Wi-Fi Alliance. “The Wi-Fi CERTIFIED designation means Wi-Fi devices meet the highest standards for interoperability and security protections.”

版权声明:本文内容由互联网用户自发贡献,该文观点仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌侵权/违法违规的内容, 请联系我们举报,一经查实,本站将立刻删除。

发布者:全栈程序员-站长,转载请注明出处:https://javaforall.net/133615.html原文链接:https://javaforall.net

(0)
全栈程序员-站长的头像全栈程序员-站长


相关推荐

  • WPF-visifire Charts 控件去掉水印

    WPF-visifire Charts 控件去掉水印WPF-visifireCharts控件去掉水印,亲自测试可用!

    2022年7月21日
    14
  • noip2013 day1

    noip2013 day11.转圈游戏(circle.cpp/c/pas)【问题描述】n个小伙伴(编号从0到n-1)围坐一圈玩游戏。按照顺时针方向给n个位置编号,从0到n-1。最初,第0号小伙伴在第0号位置,第1号小伙伴在第1号位置,……,依此类推。游戏规则如下:每一轮第0号位置上的小伙伴顺时针走到第m号位置,第1号位置小伙伴走到第m+1号位置,……,依此类推,…

    2025年6月30日
    1
  • linux压缩和解压缩命令大全「建议收藏」

    linux压缩和解压缩命令大全「建议收藏」linux压缩和解压缩命令大全

    2022年4月24日
    54
  • 谷歌域名大全_www.google.vcom

    谷歌域名大全_www.google.vcom谷歌域名大全google各国网址  美国www.google.com  加拿大www.google.ca  墨西哥www.google.com.mx  巴西www.google.com.br  智利www.google.cl  阿根廷www.google.com.ar  秘鲁www.google.com.pe  哥伦比亚www.google.com.c

    2022年10月3日
    3
  • SQL中的cast()函数「建议收藏」

    SQL中的cast()函数「建议收藏」CAST函数用于将某种数据类型的表达式显式转换为另一种数据类型。CAST()函数的参数是一个表达式,它包括用AS关键字分隔的源值和目标数据类型。语法:CAST(expressionASdata_type)expression:任何有效的SQServer表达式。AS:用于分隔两个参数,在AS之前的是要处理的数据,在AS之后是要转换的数据类型。data_type:目标系统所提供的

    2022年4月18日
    171
  • android autosize原理,(原创)AndroidAutoSize屏幕适配工具介绍[通俗易懂]

    android autosize原理,(原创)AndroidAutoSize屏幕适配工具介绍[通俗易懂]屏幕适配是我们在开发中经常会遇到的一个问题不同的机型有不同的屏幕尺寸和密度现在市场上已经有不少屏幕适配的解决方案今天就来介绍一个我自己觉得不错的AutoSize这是是一个Android端可以根据设备不同屏幕尺寸自动适配宽高的工具特点是使用起来非常简单。作者写的介绍它网站有:https://www.jianshu.com/p/4aa23d69d481代码位置:https://github.com/J…

    2022年6月6日
    382

发表回复

您的邮箱地址不会被公开。 必填项已用 * 标注

关注全栈程序员社区公众号