Unformatted text preview: the underlying RC4 algorithm is known to be secure? b. Elaborate how weak IVs leak information. 7) In the infrastructure mode, describe briefly the following operations (indicate the context). a. Association b. Re-association c. Dissociation d. Authentication e. De-authentication 8) Show where the supplicant, authenticator and authorizer (authentication server) reside in a mobile node and in an access point? 9) Explain the working of any three of the following a. WPA b. RSN c. 802.1X d. EAP e. EAPOL f. RADIUS You must answer questions 1, 2, 3 and 9 and any two additional questions. Rest of the questions may be viewed as practice problems for midterm 1. For all questions, brief and to-the-point answers are expected. You may refer to any of the text books or resources on the web. If you have got the solutions from the Internet, do not forget to include the references....
View Full Document
This note was uploaded on 02/16/2011 for the course CSE 566 taught by Professor Dr.shamboo during the Fall '10 term at SUNY Buffalo.
- Fall '10