NEW Whitepaper on FIPS 140-2 and Wi-Fi Client Devices
FIPS 140-2 defines the U.S. federal government standard for modules that protect sensitive
but unclassified information through cryptography, or encryption and decryption.
Even though FIPS 140-2 is for the federal government, many enterprises and other
non-governmental organizations are interested in FIPS 140-2 because it is a robust and
well-defined standard for security. Given the many threats to Wi-Fi® security that exist,
requiring FIPS 140-2 validation for Wi-Fi client devices may not be a bad idea.
AES-CCMP, the Wi-Fi standard for encryption and decryption, is approved for FIPS 140-2. Nearly every Wi-Fi chip supports AES-CCMP in hardware. So why are only a handful of Wi-Fi client devices validated for FIPS 140-2?
The answer is that most Wi-Fi chips for client devices lack support for a test mechanism that is required for FIPS 140-2 validation. To achieve FIPS 140-2 validation for a Wi-Fi client device, you must replace chip-based AES-CCMP with software cryptography at Layer 2 or Layer 3. Software cryptography, however, is less than ideal for some client devices.
A new white paper from Laird Technologies presents the pros and cons of requiring FIPS 140-2 validation for Wi-Fi client devices. Once you read the white paper, you will understand why an organization considering FIPS 140-2 for Wi-Fi client devices should determine whether or not WPA2™-Enterprise provides sufficient security.
To download this or other Summit White Papers, click here.
View an article version of this white paper on the Rugged PC Review website here.
Also, view the Summit Knowledge Center, here, for a comprehensive and up-to-date glossary of wireless networking terms and function outlines. The Summit Knowledge Center is an indispensible information resource for IT professionals.