IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:
Symmetric and asymmetric algorithms
Stream and block ciphers
WLAN Encryption methods
Proprietary Layer 2 implementations
One of the major concerns with wireless networking has always been the fact that wireless communications use what is referred to as an unbounded medium. The wireless signal radiates away from the transmitting device in all directions, unlike a wired signal, which travels along the path of the cable. In other words, the RF physical medium is not ...