Real 802.11 Security: Wi-Fi Protected Access and 802.11iAddison-Wesley, 2004 - 451 páginas Annotation & bull; & bull;Describes new approach to wireless security based on Wi-Fi Protected Access (WPA) and the 802.11i standard (releasing summer 2003). & bull;Wireless equipment based on the 802.11 standard accounts for up to 99% of the wireless networking market. & bull;Written by experts on wireless security. Arbaugh brings a hardcore security background and Edney brings industry experience. |
Conteúdo
Chapter | 23 |
Different Types of Attack | 33 |
Attacks on the Keys | 40 |
Direitos autorais | |
28 outras seções não mostradas
Outras edições - Ver todos
Real 802.11 Security: Wi-Fi Protected Access and 802.11i Jon Edney,William A. Arbaugh Visualização parcial - 2004 |
Real 802.11 Security: Wi-Fi Protected Access and 802.11i Jon Edney,William A. Arbaugh Prévia não disponível - 2004 |
Termos e frases comuns
access control access point AES-CCMP algorithm allow approach attack authentication method authentication server bits block bytes CBC-MAC CCMP cellular phone certificate Chapter cipher ciphertext client connection counter create decryption default keys dictionary attack EAP messages EAPOL EAPOL-Key encryption key example frame FreeRADIUS group key handshake hotspot identity IEEE IETF implement install Internet Kerberos laptop layer look MAC address MAC header master key mobile device mode MPDU MSDU multicast OpenSSL packet pairwise keys password PEAP phase plaintext problem protection pseudorandom public key RADIUS server random number received replay request S-box secret key security context security protocol sent sequence session key shown in Figure specific standard supplicant temporal keys ticket tion TKIP vendors weak keys Wi-Fi LAN wired wireless LAN WPA/RSN