O'Reilly logo

Introduction to Computer Networks and Cybersecurity by J. David Irwin, Chwan-Hwa Wu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 21

Symmetric Key Ciphers and Wireless LAN Security

The learning goals for this chapter are as follows:

  • Understand the usefulness and properties of symmetric key ciphers
  • Examine the structure and application of the most popular block ciphers
  • Explore the operation of the popular stream ciphers and contrast their operation with that employed by block ciphers
  • Understand the WLAN security used in 802.11 Wired Equivalent Privacy (WEP) and its weaknesses
  • Understand the 802.11i standards, including Wi-Fi Protected Access (WPA) and WPA2 with AES using pre-shared key (PSK), as well as their weaknesses
  • Understand the mechanisms employed in a side-channel attack and the defensive techniques that are viable

In this chapter the many facets and ramifications ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required