Skip to Content
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
book

Real 802.11 Security: Wi-Fi Protected Access and 802.11i

by Jon Edney, William A. Arbaugh
July 2003
Intermediate to advanced content levelIntermediate to advanced
480 pages
12h 4m
English
Addison-Wesley Professional
Content preview from Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Chapter 10. WPA and RSN Key Hierarchy

We talked about keys in the introduction to WPA/RSN and explained how, unlike WEP, both WPA and RSN use multiple keys at different levels. In fact, there are so many keys used, it's hard enough for the designer to keep track of them all, let alone an attacker. But don't panic, although there are many keys, they are all hidden away inside the workings of WPA/RSN—the administrator needs only to define a single master key from which all these others are derived.

This chapter describes what a key hierarchy is and why so many keys are needed. We look at the key hierarchies for TKIP and AES–CCMP, the two ciphersuites described in Chapters 11 and 12. We also review what steps are involved in creating and updating ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN

How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN

CCNA Lee Barken - CISSP MCP CPA
Enterprise Java™ Security: Building Secure J2EE™ Applications

Enterprise Java™ Security: Building Secure J2EE™ Applications

Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin
Wireshark for Wireless LANs

Wireshark for Wireless LANs

Jerome Henry / James Garringer

Publisher Resources

ISBN: 0321136209Purchase book