Chapter 3 Encryption Ciphers and Methods
IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:
✓ WEP
✓ TKIP
✓ CCMP
✓ WPA/WPA2
✓ Proprietary Layer 2 implementations
Over the years people have created many ways to secure data for many purposes. In this chapter, you will learn about the various encryption algorithms that are used to secure wireless networks. You will see how encryption ciphers work to create encrypted data from plaintext data. This chapter will also discuss the encryption methods that are part of the 802.11-2012 standard, and the ciphers ...
Get CWSP, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.