In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-09 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
This article mainly introduces what wapi refers to, has a certain reference value, interested friends can refer to, I hope you can learn a lot after reading this article, the following let the editor take you to understand it.
Wapi is the infrastructure of WLAN authentication and secrecy, a security protocol, and also a mandatory security standard of Chinese WLAN, which is proposed by the State key Laboratory of Integrated Service Network Theory and key Technologies of Xi'an University of Electronic Science and Technology. WAPI, like infrared, Bluetooth, GPRS, CDMA1X and other protocols, is a kind of wireless transmission protocol.
Correlation
WAPI (Wireless LAN Authentication and Privacy Infrastructure) is the authentication and security infrastructure of wireless local area network (WLAN). It is not only a security protocol, but also a mandatory security standard of WLAN in China. It was first proposed by the State key Laboratory of Integrated Service Network Theory and key Technologies of Xi'an University of Electronic Science and Technology.
WAPI, like infrared, Bluetooth, GPRS, CDMA1X and other protocols, is a kind of wireless transmission protocol, but unlike them, it is a transmission protocol in wireless local area network (WLAN). It is a technology in the same field as 802.11 transport protocol.
Action
1. For security reasons.
In 2013, Snowden exposed the Prism Gate incident in the United States, and at the same time, more than a dozen intelligence agencies in the United States, including NSA, the Department of Homeland Security, FBI, and CIA, have, through long-term cooperation with US standard-setting bodies, buried cryptographic algorithms and security mechanism programs with obvious technical defects into the international standards they dominated and participated in, thereby implementing the technical standard control path of the global network surveillance program. This has sounded the alarm for the network and information security of various countries, and all countries have begun to re-examine the security of WIFI and the real intention of the United States to block WAPI, which has also become an opportunity for WAPI to regain its rebirth.
For individual users, the biggest benefit of the emergence of WAPI is to make their laptops more secure from now on. We know that WLAN has high transmission speed and wide coverage, so it is very fragile in terms of security. Because the data is exposed in the air during transmission, it is easy to intercept data packets by people with ulterior motives. Although 3COM, Annette and other foreign manufacturers have developed a series of security solutions for 802.11, but generally speaking, they are not satisfactory, and their core technology is in the hands of people of other countries, and since they can formulate it, they must have a way to crack it, so in terms of security, it has become a major hidden danger for the government and business users to use WLAN. WIFI encryption technology has experienced the evolution of WEP, WPA and WPA2, and each time has greatly improved the security and difficulty of cracking. However, due to the defects of its one-way authentication, these encryption technologies have been cracked and published. WPA was cracked in 2008. WPA2 was cracked by hackers in the first half of 2010 and posted online.
Due to the more reasonable two-way authentication encryption technology, WAPI is more advanced than 802.11. WAPI adopts the elliptic curve cryptography algorithm of the public key system and the block cipher algorithm of the secret key system approved by the Office of the State Cryptography Administration Commission, and realizes the identity authentication, link authentication, access control and encryption protection of user information in the state of wireless transmission. In addition, WAPI can be divided into single-point and centralized application modes, which can completely reverse the current situation that multiple security mechanisms coexist and are incompatible with each other in WLAN, and fundamentally solve the security and compatibility problems. Therefore, China's mandatory requirements for relevant commercial organizations to implement WAPI standards can more effectively protect the security of data.
In addition, the interconnection between devices is a problem that operators must consider. At present, although the products of many manufacturers claim to have passed the wi-fi compatibility test, the security solutions proposed and adopted by different manufacturers are different. For example, Annette (AT-WR2411 wireless network card) provides a multi-level security architecture, including spread spectrum coding and encryption, and secure information is encrypted through 40-and 128-bit Wired Equivalent Privacy (WEP) encryption. When used with 3Com 11 Mbps wireless LAN Access Point 6000, 3Com's wireless network card can use advanced dynamic secure link technology, which is different from the shared key scheme, which automatically generates a 128bit encryption key for each session. In this way, due to the lack of unified security solution standards, different WLAN devices cannot communicate with each other when security functions are enabled, which makes the device management of operators extremely complex, and different user management functions need to be developed for different security schemes, resulting in a great increase in operation and maintenance costs and not conducive to protection investment, while users are unable to roam between different security AP (Access Point). And reduce customer satisfaction.
2. For the sake of interests.
China is a developing country with vigorous economic development, and many products have huge room for development, especially high-tech products. However, in the past, our country lost a lot of opportunities in high-tech products, because there are very few independent core technologies and our own industry standards, resulting in a rather passive situation: DVD has to be charged a lot of patent fees by foreigners, and the standards of GPRS, CDMA1X and so on are in the hands of foreigners, so we can only obediently give large amounts of banknotes to others to buy them. On the other hand, he is like a "part-time worker" who can only do OEM and help people assemble products. Therefore, some people say that "first-class enterprises sell standards, second-class enterprises sell technology, and third-class enterprises sell products."
Thank you for reading this article carefully. I hope the article "what does wapi mean" shared by the editor will be helpful to everyone? at the same time, I also hope that you will support us and pay attention to the industry information channel. More related knowledge is waiting for you to learn!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.