Nov 27, 2014
Aisha AzizAisha AzizCT -013CT -013
IntroductionIntroductionTo Wireless To Wireless LANsLANs
Wired Wired Equivalent Equivalent Privacy (WEP)Privacy (WEP)
•WEP came in existence in 1999.•It uses RC4 algorithm for confidentiality.
WEP WEP Cracking Cracking ReasonsReasons
Wi-Fi ProtectedWi-Fi Protected Access (WPA)Access (WPA)
Modes of WPA
Basic Key
Initialization Vector (IV)
Hash Special Key RC4
Plain Text XOR
IV
Sequential Key
Message Encrypted
Solutions of WEP Problems
WPA Issue & My Opinion
ComparisonComparison
Energy Energy ConsumptionConsumption
Energy Consumption
Session Level security protocol.
Whenever a session is need to be established there are three main entities are used Mobile station (MS), Authentication Server (AS) and Access Point (AP).
All of three works in three phases. Discovery Phase, Authentication phase and Four-way Handshake phase.
Four-way hand shake is done for a possession of PMK Pre Master Key which in turns split into Pair wise Transient key (PTK).
Cryptographic Cryptographic Key ExchangeKey Exchange