O'Reilly logo

CWSP® Certified Wireless Security Professional Official: Study Guide by Shawn M. Jackman, Bryan E. Harkins, David A. Westcott, David D. Coleman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Encryption Ciphers and Methods

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

  • Encryption basics

    • Symmetric and asymmetric algorithms

    • Stream and block ciphers

    • RC4

    • RC5

    • DES

    • 3DES

    • AES

  • WLAN Encryption methods

  • WEP

    • WEP MPDU

  • TKIP

    • TKIP MPDU

  • CCMP

    • CCMP MPDU

  • WPA/WPA2

  • Proprietary Layer 2 implementations

Encryption Ciphers and Methods

Encryption Basics

One of the major concerns with wireless networking has always been the fact that wireless communications use what is referred to as an unbounded medium. The wireless signal radiates away from the transmitting device in all directions, unlike a wired signal, which travels along the path of the cable. In other words, the RF physical medium is not ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required