Authentication

There are two authentication methods in the 802.11 standard:

Crunch Time

The shared-key authentication process is a four-step process that begins when the AP receives the validated request for association. After the AP receives the request, a series of management frames are transmitted between the stations to produce the authentication. This includes the use of the cryptographic mechanisms employed by WEP as a validation and break down in the following manner:

  1. The requestor (the client) sends a request for association.
  2. The authenticator (the AP) receives the request, and responds by producing a random challenge text and transmitting it back to the requestor.
  3. The requestor receives the transmission, encrypts the challenge ...

Get Eleventh Hour Security+ now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.