Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Enhanced Security of 802.11

No description

Ahmed Kaseb

on 22 April 2010

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Enhanced Security of 802.11

Enhanced Security of 802.11 Attacks Passive Attacks Active Attacks Objectives Confidentiality Integrity Availability Requirements Encryption &
Data Privacy Authentication &
Acces Control WEP Confidentiality Integrity Access Control Several Flaws Wired Equivalent Privacy WPA Wi-Fi Protected Access MIC Message Integrity Code TKIP Temporal Key Integrity Protocol 802.1x Port Based Network Access Control RC4 Stream Cipher Master Key Temporal Key Per-Packet Key MIC is a keyed hashing function
to protect the data packet integrity. Countermeasures Disable link for 60 seconds. Use new session key. Potential Danger DoS Direct Replacement of WEP Hardware Compatibility Encapsulation Decapsulation Integrity Access Control Better Key Management Forward Compatibility to 802.11i Weakness of TKIP Less Performance Strength remains uncertain. 802.11i WPA2 AES
Block Cipher Components 802.1x RSN CCMP for Authentication Robust Security Network for Tracking Association for Confidentiality and Integrity Ahmed Kaseb Walaa Mekkawy Walaa Abdelkawy MIC Mutual Authentication Crack is expensive. Features Encryption Algorithms Integrity Mutual Authentication TKIP CCMP WRAP Key
Management Encapsulation CCMP Counter mode with Cipher block chaining Message authentication code Protocol Decapsulation by Encryption by Checksum by Authentication by MIC
Full transcript