Chapter 5. 802.11 Layer 2 Dynamic Encryption Key Generation

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

  • Advantages of dynamic encryption

    • Dynamic WEP

    • Robust security network (RSN)

    • RSN information element

    • Authentication and key management (AKM)

    • RSNA key hierarchy

    • 4-Way Handshake

    • Group Handshake

    • PeerKey Handshake

    • Passphrase-to-PSK mapping

    • Roaming and dynamic keys

802.11 Layer 2 Dynamic Encryption Key Generation

In this chapter, you will learn about dynamic WEP, which was a short-term, nonstandard method of dynamic encryption, as well as the standards-based dynamic encryption key management methods that are widely deployed in today's enterprise WLANs.

Advantages of Dynamic Encryption

Although the 802.1X/EAP ...

Get CWSP® Certified Wireless Security Professional Official: Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.