Tags

Below you'll find a list of all posts that have been tagged as:
"certificates"

Types of WPA2 Authentication

Wireless encryption standards have developed to account for shifting network needs, emerging security threats, and discovered flaws in older encryption methods. WPA2-PSK/Personal and WPA2-ENT are the two variants of the WPA2 protocol that are in use today and provide different levels of security. WPA2 Enterprise uses IEEE 802.1X to deliver enterprise-grade authentication, and it was […]

Read Story

The Stages of 802.1X Authentication

The 802.1X authentication protocol is a state-of-the-art cryptographic network technology that provides protection for both wired and wireless networks. The fundamental concept behind the implementation of security protocols is rooted in the necessity to safeguard confidential data and authenticate individuals endeavoring to illicitly infiltrate the system. Upon network enrollment, devices must undergo authentication, which is […]

Read Story

Step-by-Step 802.1X Configuration

IEEE 802.1X To deploy WPA in a wireless network, an access point uses 802.1X. A wireless client must be authenticated using WPA before it can establish a connection with the access point. Switches use 802.1X to perform port-based authentication for wire-based networks. WPA-PSK (pre-shared key, commonly known as WPA-Personal) and WPA/WPA2 Enterprise are the most […]

Read Story

802.1X Authentication With EAP-MD5 Is Insecure

In November 2022, the French data protection authority (CNIL) announced that it had issued a fine of over $600,000 against a French energy company (EDF). The findings stated that the energy company failed to handle customers’ data reliably. The regulator also found that user credentials were stored and protected with an MD5 hash declared cryptographically […]

Read Story