
118
Chapter 5: Authentication and Encryption
AirMagnet Laptop Wireless LAN Policy Reference Guide
Figure 5-8: 4-way handshake completes the key exchange for the Pre-
shared Key mode operation
(Authenticator AP and Authentication Server AS are on the AP device)
There are two encryption standards defined in the IEEE 802.11i
standard, Temporal Key Integrity Protocol (TKIP) and Advanced
Encryption Standard-Counter Mode-CBC MAC Protocol. WLAN
traffic encrypted with TKIP and MIC defeats packet forgery, and
replay attack. TKIP is most importantly immune to the weakness
introduced by a static WEP key and attacks stemming from key
reuses. Along with
MIC, TKIP
also provides per packet key mixing
which helps prevent many keystream attacks.
Figure 5-9: TKIP and MIC encryption algorithm addresses the weakness
of static WEP as well as defeating packet forgery and replay attack.
Laptop Wireless LAN Policy Reference Guide.book Page 118 Thursday, January 25, 2007 5:36 PM
Содержание PRG-Laptop 7.0
Страница 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 30: ...22 Chapter 1 Configuration Vulnerabilities AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 136: ...128 Chapter 5 Authentication and Encryption AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...