- Temporal Key Integration Protocol (TKIP)
- Cipher-block Chaining Message authentication Protocol (CCMP)
Wi-Fi security modes:
Authentication options supported by WPA, WPA2 and WPA3:
- Preshared key (PSK) or personal (PER)
- IEEE 802.1X or enterprise (ENT)router connection
PSK is the use of a static fixed password or authentication.
ENT enables the leveraging of and existing AAA (Authentication, Authorization and Accounting) service to be used for authentication. Some examples of AAA services are RADIUS (Remote Authentication Dial-In User Service) or TACACS+.
Most domestic networks (for example, those having a password printed on a label on the router) use PSK authentication option.
Types of security protocols
Some Wi-Fi Security (WPA and WPA2) support different types of security protocols. They are described below.
Temporal Key Integration Protocol (TKIP)
It is an older encryption protocol that was considered to substitute the very insecured WEP. TKIP is actually pretty close to WEP, so you should not use it.
TKIP makes use of the RC4 encryption method.
Cipher-block Chaining Message authentication Protocol (CCMP)
Cipher-block Chaining Message authentication Protocol (CCMP) makes use of AES encryption method. Sometimes CCMP security protocol is referred as AES.
AES is one of the most popular symmetric key encryption protocol, and it has come to replace other protocols that have been deprecated.
Type of Wi-Fi Security
Wired Equivalent Protocol (WEP)
It can be hacked easily because of a vulnerability that was detected.
Wi-Fi Protected Access (WPA)
- WPA-TKIP: it can be hacked easily. Not recommended.
- WPA-AES: as WPA2-AES supersedes this option, it is not recommended.
Wi-Fi Protected Access (WPA2)
- WPA2-TKIP: it can be hacked easily. Not recommended.
- WPA2-AES: fair secure. Recommended over any other option.
- WPA2-TKIP/AES: It is the most compatible option, but is still drags the vulnerabilities from TKIP,
You might be also interested in…
- How to hack a WEP
- How to hack a WPA2
- Chris Hoffman; “Wi-Fi Security: Should You Use WPA2-AES, WPA2-TKIP, or Both?“; howtogeek.com