Wireless Security Protocols
shared by brainwaredm1 on Feb 08
2
views
0
faves
0
comments
WEP provides security, yet few shortcomings were found in this protocol. The client and the access point having a shared secret key.WEP encrypts the information with RC4 stream cipher, The IV is sent ...
in the plaintext part of the message and same key will be reused. TKIP uses a shared secret joined with the cards MAC address to create another key, which is blended with the IV to make per-packet keys. For this just a software change is required. It utilizes 802.1X to give authentication and utilizations AES as the encryption protocol. WPA2 utilizes the AES block cipher and WPAs utilize RC4 stream cipher.
Source
https://www....ity.ac.in/Category
EducationGet a Quote