<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: aes+strength in Access Points - Indoor and Outdoor</title>
    <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/aes-strength/m-p/41651#M11770</link>
    <description>WPA2-AES (without mixed, without TKIP, as you've shown in your screenshot) is still quite secure. WPA is nothing like WEP (which might as well just be open with today's technology). There's been some attacks against WPA, but WPA2 is basically only vulnerable to brute force attacking of the passphrase, which is more of a problem with preshared key and probably lesser of an issue with Enterprise as you shown.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access" rel="nofollow" target="_blank"&gt;https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;It's really not the bits of encryption that screwed over WEP and WPA1, it's fundamental design flaws in the cryptographic scheme. They seem largely resolved with WPA2.</description>
    <pubDate>Tue, 25 Aug 2015 18:41:10 GMT</pubDate>
    <dc:creator>john_d</dc:creator>
    <dc:date>2015-08-25T18:41:10Z</dc:date>
    <item>
      <title>aes+strength</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/aes-strength/m-p/41650#M11769</link>
      <description>Do we know the strength of WPA2 Enterprise with AES?&amp;nbsp; Everything I have read is not specific about how many bits of encryption this method is. WEP64 and WEP128 do say.  Something similar to this: &lt;A href="https://stixit.files.wordpress.com/2012/10/11.png" rel="nofollow" target="_blank" title="Link https//stixitfileswordpresscom/2012/10/11png"&gt; https://stixit.files.wordpress.com/2012/10/11.png&lt;/A&gt;</description>
      <pubDate>Tue, 25 Aug 2015 17:23:29 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/aes-strength/m-p/41650#M11769</guid>
      <dc:creator>joe_hickson</dc:creator>
      <dc:date>2015-08-25T17:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: aes+strength</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/aes-strength/m-p/41651#M11770</link>
      <description>WPA2-AES (without mixed, without TKIP, as you've shown in your screenshot) is still quite secure. WPA is nothing like WEP (which might as well just be open with today's technology). There's been some attacks against WPA, but WPA2 is basically only vulnerable to brute force attacking of the passphrase, which is more of a problem with preshared key and probably lesser of an issue with Enterprise as you shown.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access" rel="nofollow" target="_blank"&gt;https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;It's really not the bits of encryption that screwed over WEP and WPA1, it's fundamental design flaws in the cryptographic scheme. They seem largely resolved with WPA2.</description>
      <pubDate>Tue, 25 Aug 2015 18:41:10 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/aes-strength/m-p/41651#M11770</guid>
      <dc:creator>john_d</dc:creator>
      <dc:date>2015-08-25T18:41:10Z</dc:date>
    </item>
    <item>
      <title>Re: aes+strength</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/aes-strength/m-p/41652#M11771</link>
      <description>Thanks John, I was more or less looking to see if it is AES256 or 128 or to confirm that there is no bit strength associated with it and no matter how you cut it AES is just AES.</description>
      <pubDate>Tue, 25 Aug 2015 18:50:14 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/aes-strength/m-p/41652#M11771</guid>
      <dc:creator>joe_hickson</dc:creator>
      <dc:date>2015-08-25T18:50:14Z</dc:date>
    </item>
    <item>
      <title>Re: aes+strength</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/aes-strength/m-p/41653#M11772</link>
      <description>It's complicated (tm). WPA2 is based off AES128, but the key derivation is per-session and sourced from other information together with nonces. It's hard to find a good diagram, but this student actually did a great job at explaining the key derivation:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://cs.gmu.edu/~yhwang1/INFS612/Sample_Projects/Fall_06_GPN_6_Final_Report.pdf" rel="nofollow" target="_blank"&gt;http://cs.gmu.edu/~yhwang1/INFS612/Sample_Projects/Fall_06_GPN_6_Final_Report.pdf&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I would not be concerned about the key length being a security issue personally, but of course I'm not sure what kind of attack vectors you were concerned about preventing. It's far more likely that weak user credentials are going to pose more of a problem than brute forcing the encryption scheme.</description>
      <pubDate>Tue, 25 Aug 2015 18:56:08 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/aes-strength/m-p/41653#M11772</guid>
      <dc:creator>john_d</dc:creator>
      <dc:date>2015-08-25T18:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: aes+strength</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/aes-strength/m-p/41654#M11773</link>
      <description>That is what I figured I just wanted some confirmation from someone else.&amp;nbsp; Thanks John, take care.</description>
      <pubDate>Tue, 25 Aug 2015 20:37:49 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/aes-strength/m-p/41654#M11773</guid>
      <dc:creator>joe_hickson</dc:creator>
      <dc:date>2015-08-25T20:37:49Z</dc:date>
    </item>
    <item>
      <title>Re: aes+strength</title>
      <link>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/aes-strength/m-p/41655#M11774</link>
      <description>Sure thing! It's a good question to ask, because even slight deviations from the settings you made (like adding WPA + WPA2 mixed, or adding TKIP) would have negative security ramifications.</description>
      <pubDate>Tue, 25 Aug 2015 20:39:43 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Access-Points-Indoor-and-Outdoor/aes-strength/m-p/41655#M11774</guid>
      <dc:creator>john_d</dc:creator>
      <dc:date>2015-08-25T20:39:43Z</dc:date>
    </item>
  </channel>
</rss>

