Chapter 21

Symmetric Key Ciphers and Wireless LAN Security

The learning goals for this chapter are as follows:

  • Understand the usefulness and properties of symmetric key ciphers
  • Examine the structure and application of the most popular block ciphers
  • Explore the operation of the popular stream ciphers and contrast their operation with that employed by block ciphers
  • Understand the WLAN security used in 802.11 Wired Equivalent Privacy (WEP) and its weaknesses
  • Understand the 802.11i standards, including Wi-Fi Protected Access (WPA) and WPA2 with AES using pre-shared key (PSK), as well as their weaknesses
  • Understand the mechanisms employed in a side-channel attack and the defensive techniques that are viable

In this chapter the many facets and ramifications ...

Get Introduction to Computer Networks and Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.