- Source: WLAN Authentication and Privacy Infrastructure
WLAN Authentication and Privacy Infrastructure (WAPI) is a Chinese National Standard for Wireless LANs (GB 15629.11-2003).
Although it was allegedly designed to operate on top of Wi-Fi, compatibility with the security protocol used by the 802.11 wireless networking standard developed by the IEEE is in dispute. Due to the limited access of the standard (only eleven Chinese companies had access), it was the focus of a U.S.–China trade dispute. Following this it was submitted to, and rejected by the ISO. It was resubmitted to ISO in 2010, but was cancelled as a project on 21 November 2011 after being withdrawn by China.
How the standard works
WAPI, which was initiated to resolve the existing security loopholes (WEP) in WLAN international standard (ISO/IEC 8802-11), was issued to be Chinese national standard in 2003. WAPI works by having a central Authentication Service Unit (ASU) which is known to both the wireless user and the access point and which acts as a central authority verifying both.
The WAPI standard (draft JTC1/SC6 N14619) allows selection of the symmetric encryption algorithm, either AES or SMS4, which has been declassified in January 2006 and passed evaluation by independent experts.
History
= US–China trade dispute
=In late 2003, the Chinese government announced a policy requiring that wireless devices sold in China include WAPI support and foreign companies wanting access to the Chinese market could produce WAPI-compliant products independently or partner with one of 11 Chinese firms to which the standard was disclosed. This issue became a point of trade discussions between the then United States Secretary of State Colin Powell and his Chinese government equivalent. China agreed to indefinitely postpone implementation of the policy.
= ISO rejection
=The Chinese Standards Association (SAC: Standardization Administration of the People's Republic of China) subsequently submitted WAPI (ISO/IEC JTC1 N7904) to the ISO standards organization for recognition as an international standard, at about the same time as the IEEE 802.11i standard. After much debate related to both process issues and technical issues, the IEC/ISO Secretaries General decided to send the proposals to parallel fast track ballots. In March 2006, the 802.11i proposal was approved and the WAPI proposal was rejected. This result was confirmed at a Ballot Resolution meeting held in June 2006.
The result was subject to two appeals by SAC to the ISO/IEC Secretaries General that alleged "unethical" and "amoral" behavior during the balloting process and irregularities during the ballot resolution process. The official Chinese news agency Xinhua said on May 29, 2006, that appeals were filed in April and May 2006 and, the agency said, alleged that the IEEE was involved in "organizing a conspiracy against the China-developed WAPI, insulting China and other national bodies, and intimidation and threats." Xinhua did not make these allegations specific. In July 2006, 802.11i was published as an ISO/IEC standard. WAPI is no longer being considered by ISO/IEC and all appeals have been dismissed.
After the preliminary results were announced in March 2006, various press reports from China suggested that WAPI may still be mandated in China. TBT (Technical Barrier to Trade) declarations to the WTO in January 2006 and a statement in June 2006 to ISO/IEC JTC1/SC6, in which SAC said they would not respect the status of 802.11i as an international standard, seemed to support this possibility. However, as of early 2007, the only official Chinese policy related to WAPI is a "government preference" for WAPI in government and government-funded systems. It is unclear how strongly this preference has been enforced, and it seems to have had little effect on the non-government market.
= ISO resubmission
=In 2009, the China NB was encouraged by SC6 to resubmit WAPI to SC6. It was allocated the standard number ISO/IEC 20011 after passing the first stage of balloting. Positive votes and commitments to participate in the standardisation process were received from China, Korea, Czech Republic, Switzerland and Kenya. Negative votes were received from the US and the UK. The US and the IEEE 802.11 Working Group provided numerous detailed comments rebutting the case for standardisation made by the China NB in the New Project proposal.
The required comment resolution on the ballot only started in June 2011, with the US, UK, China, Korea and Switzerland NBs and the IEEE 802.11 Working Group all participating. The Swiss NB representative admitted during the process that he was a paid consultant to IWNCOMM, the Chinese source of the WAPI technology. The Kenya and Czech NBs did not participate in the comment resolution process or in any other discussions related to WAPI after the close of the ballot in early 2010.
The comment resolution process failed after agreement could not be established on a variety of fundamental issues. For example, the China NB continued to insist that WAPI was justified because 802.11 included WEP, which is known to be broken. On the other side, the US NB and the IEEE 802.11 NB noted that WEP-based security had been deprecated in favour of WPA2-based security in IEEE 802.11-2007, and that no one had ever alleged any issues with WPA2-based security. In addition, the IEEE 802.11 WG noted that the functionality offered by WAPI systems was equivalent to only a small subset of the security offered by WPA2-based systems.
The China NB eventually withdrew WAPI in October 2011 (document JTC1/SC6 N15030) and the project was formally cancelled by SC6 in February 2012. The reasons for the withdrawal are unclear. The Chinese proponents of WAPI from IWNCOMM were clearly very unhappy when the withdrawal was announced. It has been speculated that Chinese government authorities ordered the withdrawal on the basis that WAPI had failed to be standardised by ISO/IEC after eight years. In addition, despite mandates for WAPI to be implemented in China in Wi-Fi enabled mobile phones and by the three Chinese service providers, it is very rarely used in practice.
Chinese cell phone usage
Mobile phones in China are controlled by MIIT. The "indefinite postponing" of the WAPI requirement in 2003 caused the MIIT to stop the certification of any phones with Wi-Fi capability. In 2009, a requirement for Chinese phones to support WAPI if there is any WLAN capability was made, effectively un-banning WLAN hardware from Chinese phones. One of the sticking points behind the iPhone in China was the support of WiFi without the WAPI standard. In the end, it was released without any WLAN at all.
According to China's State Radio Monitoring Center Chinese, in April 2011 regulators approved the frequency ranges used by a new Apple mobile phone with 3G and wireless LAN support including WAPI. Dell Inc's Mini 3 phones have also received network access licenses for China.
The Chinese government's preference for the WAPI standard in some respects is similar to their preference for the TD-SCDMA for their 3G network.
WAPI Alliance
A "WAPI Alliance" analogous to the Wi-Fi Alliance exists in China.
See also
Wi-Fi
IEEE 802.11i-2004 - the competing standard
WPA2
Kerberos
References
External links
Standard texts:
ISO/IEC JTC1 N7904, 2005
ISO/IEC JTC1 N9880, 2009
GB 15629.11-2003 (Chinese, DRMed PDF, Free access from Standardization Administration of China)
Guide for WAPI implementors, 2006, in Chinese
SunTzu International LLC on WAPI
The Chinese WAPI Delegation has returned from Geneva, where at the headquarters of the International Organization for Standardization it took part in a meeting with a group promoting IEEE 802.11i
The International Organization for Standardization (ISO) rejected China's domestic wireless LAN technology to become an international standard
Xinhua May 29, 2006, report on appeals to ISO
ISO/IEC JTC1 N14228, 2009 votes
Kata Kunci Pencarian:
- WLAN Authentication and Privacy Infrastructure
- SM4 (cipher)
- IEEE 802.11i-2004
- WAPI
- Wireless LAN
- ESP32
- Wireless security
- IEEE 802.11
- Extensible Authentication Protocol
- Index of cryptography articles