7 Networking Pt.2 - Encryption on a Network When do you use...

Info iconThis preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Encryption on a Network When do you use encryption on a network? What is actually encrypted? Where is it encrypted?
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Wireless Networks Secure / Open wireless access points What's the difference? Secure :you need a password to get on your data is encrypted over the wireless Open :no password required no encryption
Background image of page 2
Wireless Networks Wireless encryption On a secure wireless connection data is encrypted between your computer and the access point After that, it is decrypted and placed on the open wire
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Wireless Networks Some encryption schemes are good Others are not Have a look around at wireless networks Do you see any using WEP encryption?
Background image of page 4
WEP Wired Equivalent Privacy Idea is that you have a 'private line' to the AP Unfortunately, there are flaws in this algorithm
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
WEP uses a stream cipher A type of one-time-pad What can't you do with a one-time-pad? Use it again
Background image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 15

7 Networking Pt.2 - Encryption on a Network When do you use...

This preview shows document pages 1 - 7. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online