peterson_WirelessSecurity

peterson_WirelessSecurity - Wireless Security Wireless...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Wireless Security Wireless Security By Robert Peterson M.S. C.E. By Robert Peterson M.S. C.E. Cryptographic Protocols Cryptographic Protocols University of Florida University of Florida College of Information Sciences & College of Information Sciences & Engineering Engineering 802.11b overview 802.11b overview Not originally designed for the Not originally designed for the business world business world No No load balancing load balancing SSID SSID was intended to be used much like a strong was intended to be used much like a strong password (long, non-meaningful strings, password (long, non-meaningful strings, symbols) symbols) Access Points (APs) broadcast Beacon Frames Access Points (APs) broadcast Beacon Frames periodically. periodically. SSID scans SSID scans were not an intended were not an intended feature of the standard. feature of the standard. There are two types of security There are two types of security in 802.11b in 802.11b (1) (1) An An authentication authentication standard for standard for connecting to an access point connecting to an access point (2) (2) Wireless Encryption Protocol ( Wireless Encryption Protocol ( WEP WEP ) ) which encrypts each wireless data frame which encrypts each wireless data frame Access Point Authentication Access Point Authentication There are two choices: There are two choices: (1) (1) Open Authentication Open Authentication (none) (none) (2) (2) Shared Key Authentication Shared Key Authentication : : a) user sends request to AP a) user sends request to AP b) user receives b) user receives ChallengeText ChallengeText c) user sends back {ChallengeText} c) user sends back {ChallengeText} WEP_Key WEP_Key The encryption method used is called The encryption method used is called RC4 RC4 RC4 is a symmetric stream cipher with an arbitrary RC4 is a symmetric stream cipher with an arbitrary key size. RC4 was created by Ron Rivest of RSA key size. RC4 was created by Ron Rivest of RSA Security in 1987....
View Full Document

Page1 / 20

peterson_WirelessSecurity - Wireless Security Wireless...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online