{"id":385,"date":"2019-07-31T17:34:27","date_gmt":"2019-07-31T09:34:27","guid":{"rendered":"http:\/\/cms.aaasec.com.tw\/?p=385"},"modified":"2019-08-02T14:19:22","modified_gmt":"2019-08-02T06:19:22","slug":"s-06","status":"publish","type":"post","link":"https:\/\/cms.aaasec.com.tw\/index.php\/2019\/07\/31\/s-06\/","title":{"rendered":"Wi-Fi \u5b89\u5168\u5831\u4f60\u77e5"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-388\" src=\"https:\/\/cms.aaasec.com.tw\/wp-content\/uploads\/2019\/07\/facebook-In-Stream_Square___June.png\" alt=\"\" width=\"720\" height=\"720\" \/><!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>\u76f8\u4fe1\u5404\u4f4d\u8b80\u8005\u61c9\u8a72\u6709\u9032\u5230\u63d0\u4f9bWi-Fi\u7684\u5e97\u5bb6\u6642\uff0c\u5e38\u6703\u62ff\u51fa\u624b\u6a5f\u958b\u59cb\u5c0b\u627e\u5e97\u5bb6Wi-Fi\u4f86\u4f7f\u7528\u7684\u7d93\u9a57\u5427\uff1f\u4f46\u8981\u5c0f\u5fc3\u9019\u53ef\u80fd\u6f5b\u85cf\u5371\u6a5f\uff0c\u56e0\u70ba\u6211\u5011\u7121\u6cd5\u78ba\u5b9a\u9019\u500bWi-Fi\u662f\u5426\u4f7f\u7528\u8db3\u5920\u5b89\u5168\u7684\u52a0\u5bc6\uff0c\u9019\u53ef\u80fd\u6703\u4f7f\u4eba\u906d\u53d7\u5982\u4e2d\u9593\u4eba\u653b\u64ca\u9019\u985e\u7684\u624b\u6cd5\u5c0e\u81f4\u500b\u8cc7\u5916\u6d29\u3002<\/p>\n<p>\u5728\u63d0\u5230\u61c9\u5c0d\u63aa\u65bd\u524d\uff0cWi-Fi\u672c\u8eab\u53c8\u6709\u4ec0\u9ebc\u9632\u8b77\u6a5f\u5236\u5462\uff1f\u4ee5\u4e0b\u5c31\u8b93\u5c0f\u7de8\u4f86\u7c21\u55ae\u8aaa\u660e\u4e0bWi-Fi\u5728\u5b89\u5168\u5354\u5b9a\u7684\u6f14\u8b8a\u5427\uff01<\/p>\n<h2>WEP<\/h2>\n<p>WEP\u52a0\u5bc6\u5168\u540d\u70baWired Equivalent Privacy\uff0c\u4e26\u4ee5\u4e32\u6d41\u52a0\u5bc6\u6cd5RC4(Rivest Cipher 4)\u4f5c\u70ba\u5176\u52a0\u5bc6\u6f14\u7b97\u6cd5\uff0c\u7136\u800c\u7531\u65bcRC4\u662f\u4ee5\u56fa\u5b9a\u4e0d\u8b8a\u7684WEP\u5bc6\u9470\uff0c\u4ee5\u53ca24\u4f4d\u5143\u7684\u521d\u59cb\u5411\u91cf(Initialization Vector, IV)\u53bb\u9032\u884c\u904b\u7b97\uff0c\u56e0\u6b64\u8b8a\u5316\u6027\u50c5\u6709\u4e00\u5343\u516d\u767e\u591a\u842c\u7a2e\uff0c\u5118\u7ba1\u770b\u8d77\u4f86\u6578\u91cf\u5f88\u591a\uff0c\u4f46\u5728\u7e41\u5fd9\u7684\u7db2\u8def\u4e2d\u5176\u5be6\u5f88\u5bb9\u6613\u51fa\u73fe\u76f8\u540c\u7684IV\uff0c\u9019\u4f7f\u5f97WEP\u52a0\u5bc6\u6a5f\u5236\u8b8a\u5f97\u80fd\u5920\u8f15\u6613\u5730\u88ab\u7834\u89e3\u3002<\/p>\n<p>\u6b64\u5916WEP\u6240\u4f7f\u7528\u7684CRC-32(Cyclic Redundancy Check)\uff0c\u4e00\u7a2e\u53ef\u7528\u65bc\u9a57\u8b49\u8a0a\u606f\u5b8c\u6574\u6027\u7684\u6280\u8853\uff0c\u540c\u6a23\u662f\u53ef\u80fd\u6703\u88ab\u653b\u64ca\u8005\u5229\u7528\u7684\u5f31\u9ede\uff0c\u56e0\u70ba\u5176\u672c\u8eab\u4e4b\u7d50\u69cb\u5bb9\u6613\u906d\u5230\u7ac4\u6539\uff0c\u6240\u4ee5\u653b\u64ca\u8005\u80fd\u5920\u4fee\u6539\u8a0a\u606f\u5167\u5bb9\u4e26\u5c07\u5176\u507d\u88dd\u6210\u5408\u6cd5\u7684\u5c01\u5305\uff0c\u900f\u904e\u9019\u500b\u5f31\u9ede\u9032\u884c\u5f8c\u7e8c\u5404\u7a2e\u653b\u64ca\u7684\u64cd\u4f5c\u3002<\/p>\n<p>\u57fa\u65bc\u4e0a\u8ff0\u7684\u5b89\u5168\u6027\u5f31\u9ede\uff0cWEP\u5df2\u65bc2003\u5e74\u88ab\u7576\u6642\u63a8\u51fa\u7684WPA\u6240\u53d6\u4ee3\u3002<\/p>\n<h2>WPA<\/h2>\n<p>\u6b63\u5982\u4e0a\u90e8\u5206\u6240\u63cf\u5beb\u7684\u5167\u5bb9\u2014WEP\u5b89\u5168\u6027\u904e\u4f4e\uff0cWi-Fi\u806f\u76df\u63a5\u8457\u63d0\u51fa\u4e86\u5be6\u73fe\u5927\u90e8\u5206IEEE 802.11i\u6a19\u6e96\u7684WPA(Wi-Fi Protected Access)\u4f5c\u70ba\u6a19\u6e96\u5b8c\u5099\u524d\u7684\u904e\u6e21\u65b9\u6848\uff0c\u70ba\u4e86\u80fd\u76f8\u5bb9\u65bc\u4f7f\u7528WEP\u7684\u8a2d\u5099\uff0cWPA\u7e7c\u7e8c\u4f7f\u7528\u4e86RC4\u6f14\u7b97\u6cd5\u4e26\u52a0\u5165\u4e86TKIP(Temporal Key Integrity Protocol)\u52a0\u5bc6\u5354\u5b9a\u4f86\u63d0\u5347\u5b89\u5168\u6027\u3002<\/p>\n<p>TKIP\u5177\u6709\u591a\u9805\u5b89\u5168\u529f\u80fd\uff0c\u5206\u5225\u662f\u5c07IV\u7684\u4f4d\u5143\u6578\u589e\u5927\uff0c\u4e26\u5c0d\u65bc\u6bcf\u500b\u5c01\u5305\u90fd\u7d66\u4e88\u552f\u4e00\u7684\u4e00\u7d44\u5bc6\u9470\uff0c\u85c9\u6b64\u63d0\u9ad8\u5c01\u5305\u906d\u5230\u7834\u89e3\u7684\u96e3\u5ea6\uff1b\u6b64\u5916\u4ea6\u4f7f\u7528\u4e86\u80fd\u5920\u9a57\u8b49\u8cc7\u6599\u5b8c\u6574\u6027\u768464\u4f4d\u5143\u7684MIC(Message Integrity Check)\u4ee5\u9632\u6b62\u5c01\u5305\u906d\u5230\u7ac4\u6539\u3002\u800cWPA\u4e5f\u5be6\u4f5c\u4e86\u5e8f\u5217\u6280\u8853\u7684\u529f\u80fd\uff0c\u80fd\u5920\u9632\u79a6\u91cd\u9001\u653b\u64ca\u3002<\/p>\n<h2>WPA2<\/h2>\n<p>\u7576IEEE 802.11i\u6a19\u6e96\u5b8c\u5099\u5f8c\uff0cWPA2\u4f5c\u70ba\u5b8c\u5168\u5be6\u73fe\u8a72\u6a19\u6e96\u7684\u6280\u8853\u4e5f\u88ab\u6b63\u5f0f\u63d0\u51fa\uff0c\u63a1\u7528\u4e86AES(Advanced Encryption Standard)\u6f14\u7b97\u6cd5\u4f86\u53d6\u4ee3\u5177\u6709\u6f0f\u6d1e\u7684RC4\u4ee5\u53caCCMP(Counter Mode with CBC-MAC Protocol)\u4f86\u53d6\u4ee3TKIP\uff0cCCMP\u4f7f\u7528\u4e86128\u500b\u4f4d\u5143\u7684\u5bc6\u9470\u4ee5\u53ca48\u4f4d\u5143\u7684IV\u4ee5\u9632\u79a6\u91cd\u9001\u653b\u64ca\uff0c\u4e26\u540c\u6642\u63d0\u4f9b\u6578\u64da\u96b1\u79c1\u3001\u8cc7\u6599\u9a57\u8b49\u53ca\u5b8c\u6574\u6027\u3002<\/p>\n<p>\u5118\u7ba1WPA2\u5df2\u7d93\u80fd\u62b5\u64cb\u5927\u591a\u6578\u7684\u653b\u64ca\uff0c\u4f46\u662f\u4f9d\u7136\u6709\u53ef\u80fd\u88ab\u540d\u70baKRACK(Key Reinstallation Attack)\u7684\u653b\u64ca\u624b\u6bb5\u5371\u5bb3\uff0c\u6240\u8b02\u7684KRACK\u653b\u64ca\uff0c\u662f\u6307\u99ed\u5ba2\u5229\u7528WPA2\u4f7f\u7528\u7684\u56db\u5411\u4ea4\u63e1(4-way handshake)\u6a5f\u5236\u4e2d\u4e00\u65e6\u672a\u6536\u5230\u7b2c\u56db\u6b21\u63e1\u624b\u7684\u56de\u61c9\u6642\uff0c\u5c07\u6703\u6301\u7e8c\u50b3\u9001\u5305\u542b\u52a0\u5bc6\u91d1\u9470\u7684\u7b2c\u4e09\u6b21\u56de\u61c9\uff0c\u900f\u904e\u4e0d\u65b7\u91cd\u65b0\u5b89\u88dd\u76f8\u540c\u5bc6\u9470\u4ee5\u91cd\u8a2d\u5171\u540c\u91d1\u9470Nonce\uff0c\u9032\u800c\u7834\u89e3\u5176\u52a0\u5bc6\u3002<\/p>\n<h2>WPA3<\/h2>\n<p>WPA3\u4f5c\u70ba\u76ee\u524d\u6700\u65b0\u7684\u6280\u8853\uff0c\u70ba\u4e86\u907f\u514d\u4e0a\u8ff0\u6240\u63d0\u5230\u7684KRACK\u653b\u64ca\uff0cWPA3\u63a1\u7528\u4e86\u540d\u70baSAE( Simultaneous Authentication of Equals)\u7684\u6280\u8853\uff0c\u800c\u975eWPA2\u7684\u56db\u5411\u4ea4\u63e1\uff0c\u85c9\u7531\u5b8c\u5168\u4e0d\u540c\u7684\u4ea4\u63e1\u6a5f\u5236\u9632\u6b62\u906d\u5230\u96f7\u540c\u7684\u653b\u64ca\u3002<\/p>\n<p>\u6b64\u5916\uff0cWPA3\u5141\u8a31\u4ee5\u5171\u4eab\u5bc6\u78bc\u5916\u7684\u65b9\u6cd5\u767b\u5165\u81f3\u516c\u5171\u7db2\u8def\uff0c\u4e5f\u5c31\u662f\u7a31\u70baDPP(Wi-Fi Device Provisioning Protocol)\u7684\u7cfb\u7d71\uff0c\u8a72\u7cfb\u7d71\u5141\u8a31\u4f7f\u7528\u8005\u5229\u7528NFC(Near Field Communication)\u6a19\u7c64\u6216QR code(Quick Response Code)\u4f86\u9a57\u8b49\u7db2\u8def\u4e0a\u7684\u8a2d\u5099\u3002<\/p>\n<p>\u6700\u5f8c\uff0c\u4e0d\u540c\u65bc\u4f7f\u7528128\u4f4d\u5143\u52a0\u5bc6\u7684WPA2\uff0cWPA3\u4f7f\u7528\u4e86256\u4f4d\u5143\u7684\u52a0\u5bc6\u6280\u8853\uff0c\u5176\u7834\u89e3\u7684\u96e3\u5ea6\u5c07\u9060\u9ad8\u65bcWPA2\u3002<\/p>\n<h2>\u7d50\u8ad6<\/h2>\n<p>\u4ee5\u4e0a\u662f\u95dc\u65bcWi-Fi\u5728\u9023\u7dda\u5354\u5b9a\u7684\u6f14\u5316\uff0c\u6700\u5f8c\u5c0f\u7de8\u5efa\u8b70\u80fd\u4e0d\u4f7f\u7528\u964c\u751f\u5834\u6240\u7684Wi-Fi\u662f\u6700\u597d\u7684\uff0c\u4f46\u82e5\u6709\u6025\u4e8b\u5fc5\u9808\u9023\u7dda\u8655\u7406\u7684\u8a71\u4e5f\u8981\u6709\u61c9\u5c0d\u63aa\u65bd\uff0c\u4ee5\u4e0b\u9644\u4e0a\u56db\u500b\u4f7f\u7528Wi-Fi\u8981\u6709\u7684\u597d\u7fd2\u6163\uff0c\u5e6b\u52a9\u5404\u4f4d\u80fd\u66f4\u597d\u5730\u4fdd\u8b77\u597d\u81ea\u5df1\u7684\u500b\u8cc7\uff1a<\/p>\n<p>1. \u4e0d\u96a8\u610f\u4f7f\u7528\u516c\u5171\u5834\u6240\u7684Wi-Fi\uff0c\u5c24\u5176\u662f\u672a\u8a2d\u5bc6\u78bc\u7684Wi-Fi\u3002<\/p>\n<p>2. \u9078\u64c7\u4f7f\u7528WPA2\u4ee5\u4e0a\u7684Wi-Fi\u3002<\/p>\n<p>3. \u4e0a\u7db2\u6642\u76e1\u91cf\u9023\u5177\u6709Https\u7684\u7db2\u7ad9\u3002<\/p>\n<p>4. \u4f7f\u7528\u53ef\u4fe1\u4efb\u7684VPN(Virtual Private Network)\u9032\u884c\u9023\u7dda\uff0c\u5927\u591a\u6578VPN\u90fd\u63d0\u4f9b\u9023\u7dda\u52a0\u5bc6\uff0c\u4e14\u52a0\u5bc6\u6280\u8853\u8207\u9023\u7dda\u901f\u5ea6\u4e5f\u90fd\u6709\u6240\u4e0d\u540c\uff0c\u8acb\u4f9d\u7167\u500b\u4eba\u9700\u6c42\u53bb\u9078\u64c7\uff0c\u5c0f\u7de8\u4ecd\u7136\u4e0d\u5efa\u8b70\u4f7f\u7528\u514d\u8cbb\u6216\u4f86\u8def\u4e0d\u660e\u7684VPN\u5594\u3002<\/p>\n<h2>Reference<\/h2>\n<p><a href=\"https:\/\/www.ithome.com.tw\/tech\/96292\">\u7121\u7dda\u7db2\u8def\u52a0\u5bc6\u6a19\u6e96\u7c21\u4ecb<\/a><\/p>\n<p><a href=\"http:\/\/www.opus1.com\/www\/whitepapers\/whatswrongwithwep.pdf\">What\u2019s Wrong With WEP?<\/a><\/p>\n<p><a href=\"https:\/\/openxtra.org\/article\/wep-weaknesses\">Why is WEP crackable?<\/a><\/p>\n<p><a href=\"https:\/\/searchmobilecomputing.techtarget.com\/definition\/Wi-Fi-Protected-Access\">Wi-Fi Protected Access (WPA)<\/a><\/p>\n<p><a href=\"https:\/\/www.howtogeek.com\/167783\/htg-explains-the-difference-between-wep-wpa-and-wpa2-wireless-encryption-and-why-it-matters\/\">The Difference Between WEP, WPA, and WPA2 Wi-Fi Passwords<\/a><\/p>\n<p><a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/CCMP-Counter-Mode-with-Cipher-Block-Chaining-Message-Authentication-Code-Protocol\">CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)<\/a><\/p>\n<p><a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/WPA3\">WPA3<\/a><\/p>\n<p><a href=\"https:\/\/www.netspotapp.com\/what-is-wpa3.html\">What is WPA3<\/a><\/p>\n<p><a href=\"https:\/\/news.sophos.com\/zh-tw\/2017\/10\/22\/\u4f86\u81ea-krack-\u653b\u64ca\u7684-wi-fi-\u98a8\u96aa-\u9632\u7bc4\u63aa\u65bd\/\">\u4f86\u81ea KRACK \u653b\u64ca\u7684 Wi-Fi \u98a8\u96aa \u2013 \u9632\u7bc4\u63aa\u65bd<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[9,6],"tags":[17],"_links":{"self":[{"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/posts\/385"}],"collection":[{"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/comments?post=385"}],"version-history":[{"count":3,"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/posts\/385\/revisions"}],"predecessor-version":[{"id":390,"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/posts\/385\/revisions\/390"}],"wp:attachment":[{"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/media?parent=385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/categories?post=385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms.aaasec.com.tw\/index.php\/wp-json\/wp\/v2\/tags?post=385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}