Chapter 5. 802.11 Layer 2 Dynamic Encryption Key Generation
IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:
Advantages of dynamic encryption
Dynamic WEP
Robust security network (RSN)
RSN information element
Authentication and key management (AKM)
RSNA key hierarchy
4-Way Handshake
Group Handshake
PeerKey Handshake
Passphrase-to-PSK mapping
Roaming and dynamic keys
In this chapter, you will learn about dynamic WEP, which was a short-term, nonstandard method of dynamic encryption, as well as the standards-based dynamic encryption key management methods that are widely deployed in today's enterprise WLANs.
Advantages of Dynamic Encryption
Although the 802.1X/EAP ...
Get CWSP® Certified Wireless Security Professional Official: Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.