O'Reilly logo

Wireless Networks first-step by Jim Geier

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Encryption

Encryption alters the bits of each data packet to guard eavesdroppers from decoding data, such as credit card numbers. Before encryption the data is called plaintext, which is easy to decode by using sniffing tools. The encryption converts the plaintext into ciphertext, which someone can decode only through the use of a proper secret key.

Many encryption methods, such as the 802.11 Wired Equivalent Privacy (WEP), are symmetric—that is, the same key that does the encryption is also the one that performs the decryption. Figure 8-4 illustrates this process.

Figure 8-4. Symmetric Encryption Uses a Common Key

For example, the radio NIC uses ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required