• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 568
  • Last Modified:

How WEP/WPA work

Please confirm my below understanding :-

1) WPA or WEP is a security protocol install inside Access Point ( WAP ) and not on the    
    wireless laptops

2) Either wireless laptop send data to AP or AP send data to wireless laptop , the data is  
    encrypted by WEP/WPA that reside in AP.

    In the other words , the data is encrypted bi-directionally by WEP/WPA which is  in AP .

Please point out whether (1) and (2) are correct .

   
0
kcn
Asked:
kcn
  • 2
1 Solution
 
nbhuCommented:
Hi kcn,
Neither is exectly true, they are security protocols that are used on all hardware accessing the network over wireless connection.
WEP is an older, more vulnerable one, WPA or WPA2 is always a better,safer choice.
on simple networks WPA-PSK can be used, you have to set a passphrase on the router/access point, and set it on the connecting clients too.
A security key is generated from the passphrase, and it is used to code/decode data packets sent over the network.
Regards, nbhu
0
 
kcnAuthor Commented:
I am not asking comparison between WEP and WPA2 , I know their differences .

I am asking whether WEP/WPA is only reside in AP or also reside in laptop ??

Since ( assuming ) WEP or WPA only reside in AP , when AP send data to client (laptop) , AP will use WEP/WPA2 to encrpyt the data , however when client ( laptop) send data to AP whether the data from laptop is encrypted by WEP/WPA that reside in AP too ??

I am not interested in WEP or WPA /WPA2 comparison.
0
 
nbhuCommented:
Hi,
both directions are encrypted of course. The source(sender: AP or laptop) is encrypting data packets, sends it over the radio link, the receiver(the other device) is decrypting the packet and processing it.
It is symmetrical, every communicating device has the encrypt/decrypt algorithms.
Regards, nbhu
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Upgrade your Question Security!

Your question, your audience. Choose who sees your identity—and your question—with question security.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now