-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Network Protocols for Security Professionals
By :
Even with the best research and implementation of highly protected algorithms, once algorithms are made public, there is always a way to penetrate them. This is especially true for wireless algorithms, as these algorithms were made with good intentions and to provide users around the globe with a secure channel to access data over the internet, but with time, the WLAN encryption algorithms started getting penetrated. The first algorithm that was broken was Wired Equivalent Privacy (WEP), which used a single key (static) to encrypt packets and then send them over the channel; hence, an attacker, after dumping a good amount of data packets, can decipher the key within a few minutes. Something better was required, and so WPA/WPA2 was introduced.
Important Note
WEP is outdated technology and is no longer used in organizations. Hence, we will focus on currently running wireless encryptions.
Change the font size
Change margin width
Change background colour