WPA3在2018年为无线安全添砖加瓦

WPA3在2018年为无线安全添砖加瓦Wi-FiAllianceAnnouncesWPA3,theSuccessortoWi-Fi’sWPA2SecurityProtocolTheWi-FiAlliance–comprising15majorsponsormembers(includingApple,Cisco,Dell,Intel,Microsoft,Qualcomman

大家好,又见面了,我是你们的朋友全栈君。

Wi-Fi Alliance Announces WPA3, the Successor to Wi-Fi’s WPA2 Security Protocol

The Wi-Fi Alliance — comprising 15 major sponsor members (including Apple, Cisco, Dell, Intel, Microsoft, Qualcomm and more) and hundreds of contributing members — has announced that WPA3 will be introduced during 2018. 

WPA3 is not an immediate replacement for WPA2, which will continue to be maintained and enhanced. In particular, the Alliance will introduce new testing enhancements for WPA2 to reduce the potential for vulnerabilities caused by network misconfigurations; and will further safeguard managed networks with centralized authentication services.

New Wi-Fi Alliance WPA3 certified devices will take some time to filter into widespread use. Use of the new specification will require WPA3 devices and WPA3 routers — and since the vast majority of home wi-fi users never buy a router but use the one supplied by their ISP, many users won’t become WPA3 compatible before they change ISPs. That could take several years.

WPA3 Security ProtocolNevertheless, there are some welcome enhancements over the WP2 specification that has kept users largely, but not entirely, protected for around two decades.

Four new capabilities for both personal and enterprise networks have been announced. There are no technical details in the Wi-Fi announcement, leading to some conjecture over exactly how they will be introduced.

The first will be to provide “robust protections” even when the user fails to use a strong password. Mathy Vanhoef, the researcher who discovered the KRACK WPA2 vulnerability, has suggested on Twitter, “That means dictionary attacks no longer work. The handshake they’re referring to is likely Simultaneous Authentication of Equals (SAE). Which is also called Dragonfly;” adding, “The standards behind WPA3 already existed for a while. But now devices are  *required* to support them, otherwise they’re won’t receive the “WPA3-certified” label.”

The second will simplify the process of configuring security on wi-fi devices that have limited or no display interface. The obvious use will be for small personal devices, like wearables such as smart watches — but it could also play some role in improving the future security of the industrial internet of things.

The third will improve the security of open wi-fi hotspots — such as cafes, hotels and airport lounges — by giving each user individualized data encryption. On this, Vanhoef commented, “This might refer to Opportunistic Wireless Encryption: encryption without authentication.” It won’t make the use of wi-fi hotspots completely secure, but should go some way to reassuring security officers who know that corporate employees work from hotspots while traveling.

The fourth will be a 192-bit security suite aligned with the Commercial National Security Algorithm (CNSA) Suite, that will further protect wi-fi networks with higher security requirements; such as government, defense, and industrial.

We can expect that new WPA3 devices will start to appear over the next few months — particularly since many of the manufacturers will be members of the Alliance. However, the devices will need wait for the launch of the Wi-Fi Alliance’s formal certification process before they can be truly called such. The Wi-Fi Certified designation will be important to reassure buyers.

“Security is a foundation of Wi-Fi Alliance certification programs, and we are excited to introduce new features to the Wi-Fi CERTIFIED family of security solutions,” commented Edgar Figueroa, president and CEO of Wi-Fi Alliance. “The Wi-Fi CERTIFIED designation means Wi-Fi devices meet the highest standards for interoperability and security protections.”

版权声明:本文内容由互联网用户自发贡献,该文观点仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌侵权/违法违规的内容, 请联系我们举报,一经查实,本站将立刻删除。

发布者:全栈程序员-站长,转载请注明出处:https://javaforall.net/133615.html原文链接:https://javaforall.net

(0)
全栈程序员-站长的头像全栈程序员-站长


相关推荐

  • java拦截器放行_java拦截器放行某些请求

    java拦截器放行_java拦截器放行某些请求在java开发中,拦截器使用是很普遍的,最常用的就是登陆拦截了,然后并不是所有的请求我们都需要拦截,比如index页面的请求我们是不拦截的.通常情况下我们有两种方式:先贴出来springboot使用拦截器的case:1.自定义拦截器,实现HandlerInterceptor,也可以采用继承的方式(HandlerInterceptorAdapter),内容不重要,看过程publicclassL…

    2022年6月7日
    154
  • DropDownList1 添加一个默认选中项

    DropDownList1 添加一个默认选中项DropDownList1添加一个默认选中项DropDownList1.DataSource=bb.drop();DropDownList1.DataTextField=”BookType”;DropDownList1.DataValueField=”BookTypeid”;DropDownList1.DataBind();DropDownList1.Ite..

    2022年7月18日
    9
  • ssd1315驱动oled屏_oled屏幕的手机有哪些

    ssd1315驱动oled屏_oled屏幕的手机有哪些淘宝隔壁老王家的OLED运动手环,非常的便宜2RMB一个。###Part0:可用器件列表0x00:OLDE屏幕:0.91inch,分辨率:12832,主控:SSD1306,接口:SPI,颜色:

    2022年8月4日
    2
  • 跨平台数据整合系统_lvc异构系统

    跨平台数据整合系统_lvc异构系统1.muleESB整合系统四种模式A.简单服务模式属于几个webService之间的同步调用,请求响应处理模式。B.桥接模式C.校验器模式校验器模式通过定义一个校验过滤器过滤服务请求,并同步返回

    2022年8月2日
    6
  • 同学说年薪30w豆瓣_朋友圈集赞怎么写

    同学说年薪30w豆瓣_朋友圈集赞怎么写我们经常在朋友圈中看到有人发这样的消息:或者,许久不联系的好友突然发消息说:「帮忙朋友圈第一条点赞~谢谢~」这样的朋友圈消息屡见不鲜,他们无非是想兑换一些不值钱的小奖品,来满足自己「占便宜」的心理。你…

    2022年9月5日
    2
  • Caffe2安装_caffe教程

    Caffe2安装_caffe教程一、依赖库的安装首先1.首先需要安装Ubuntu16.04与14.04都需要的依赖库。sudoaptupdatesudoaptinstall-y–no-install-recommends\build-essential\cmake\git\libgoogle-glog-dev\lib…

    2022年10月26日
    0

发表回复

您的邮箱地址不会被公开。 必填项已用 * 标注

关注全栈程序员社区公众号