O'Reilly logo

CWSP® Certified Wireless Security Professional Official: Study Guide by Shawn M. Jackman, Bryan E. Harkins, David A. Westcott, David D. Coleman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. 802.11 Layer 2 Dynamic Encryption Key Generation

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

  • Advantages of dynamic encryption

    • Dynamic WEP

    • Robust security network (RSN)

    • RSN information element

    • Authentication and key management (AKM)

    • RSNA key hierarchy

    • 4-Way Handshake

    • Group Handshake

    • PeerKey Handshake

    • Passphrase-to-PSK mapping

    • Roaming and dynamic keys

802.11 Layer 2 Dynamic Encryption Key Generation

In this chapter, you will learn about dynamic WEP, which was a short-term, nonstandard method of dynamic encryption, as well as the standards-based dynamic encryption key management methods that are widely deployed in today's enterprise WLANs.

Advantages of Dynamic Encryption

Although the 802.1X/EAP ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required