Chapter 3. Encryption Ciphers and Methods
IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:
Encryption basics
Symmetric and asymmetric algorithms
Stream and block ciphers
RC4
RC5
DES
3DES
AES
WLAN Encryption methods
WEP
WEP MPDU
TKIP
TKIP MPDU
CCMP
CCMP MPDU
WPA/WPA2
Proprietary Layer 2 implementations
Encryption Basics
One of the major concerns with wireless networking has always been the fact that wireless communications use what is referred to as an unbounded medium. The wireless signal radiates away from the transmitting device in all directions, unlike a wired signal, which travels along the path of the cable. In other words, the RF physical medium is not ...
Get CWSP® Certified Wireless Security Professional Official: Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.