Real 802.11 Security: Wi-Fi Protected Access and 802.11iAddison-Wesley Professional, 2004 - 451 pages Annotation & bull; & bull;Describes new approach to wireless security based on Wi-Fi Protected Access (WPA) and the 802.11i standard (releasing summer 2003). & bull;Wireless equipment based on the 802.11 standard accounts for up to 99% of the wireless networking market. & bull;Written by experts on wireless security. Arbaugh brings a hardcore security background and Edney brings industry experience. |
Contents
IV | 3 |
VI | 5 |
VII | 6 |
VIII | 7 |
X | 8 |
XII | 10 |
XIII | 11 |
XIV | 12 |
CXLIII | 196 |
CXLV | 199 |
CXLVII | 201 |
CXLIX | 203 |
CL | 204 |
CLI | 207 |
CLIII | 210 |
CLIV | 211 |
XV | 13 |
XVI | 15 |
XVII | 17 |
XVIII | 19 |
XIX | 21 |
XX | 22 |
XXI | 23 |
XXII | 25 |
XXIII | 26 |
XXIV | 27 |
XXV | 29 |
XXVI | 30 |
XXVII | 31 |
XXVIII | 32 |
XXIX | 33 |
XXX | 34 |
XXXI | 35 |
XXXII | 36 |
XXXIII | 37 |
XXXIV | 40 |
XXXV | 41 |
XXXVII | 42 |
XXXVIII | 45 |
XXXIX | 46 |
XL | 47 |
XLI | 48 |
XLII | 49 |
XLIII | 51 |
XLV | 53 |
XLVI | 54 |
XLVII | 55 |
XLVIII | 56 |
LII | 57 |
LIV | 58 |
LV | 60 |
LVI | 63 |
LVII | 65 |
LVIII | 67 |
LX | 69 |
LXI | 72 |
LXII | 73 |
LXIII | 74 |
LXIV | 76 |
LXV | 83 |
LXVII | 84 |
LXVIII | 85 |
LXIX | 86 |
LXX | 89 |
LXXI | 90 |
LXXII | 93 |
LXXIV | 94 |
LXXV | 95 |
LXXVI | 99 |
LXXVII | 100 |
LXXVIII | 101 |
LXXIX | 103 |
LXXX | 104 |
LXXXI | 105 |
LXXXII | 106 |
LXXXIII | 107 |
LXXXIV | 108 |
LXXXV | 110 |
LXXXVI | 111 |
LXXXVII | 113 |
LXXXIX | 114 |
XC | 115 |
XCI | 117 |
XCIII | 120 |
XCIV | 122 |
XCV | 124 |
XCVI | 127 |
XCVII | 129 |
XCVIII | 131 |
XCIX | 133 |
CI | 134 |
CIV | 135 |
CVI | 137 |
CVII | 138 |
CVIII | 140 |
CIX | 144 |
CX | 146 |
CXI | 147 |
CXII | 149 |
CXIV | 150 |
CXV | 151 |
CXVIII | 153 |
CXIX | 155 |
CXXI | 156 |
CXXII | 159 |
CXXIII | 164 |
CXXIV | 165 |
CXXV | 169 |
CXXVIII | 171 |
CXXX | 172 |
CXXXI | 174 |
CXXXII | 176 |
CXXXIII | 178 |
CXXXIV | 184 |
CXXXV | 186 |
CXXXVI | 188 |
CXXXVII | 189 |
CXL | 191 |
CXLI | 192 |
CXLII | 193 |
CLV | 212 |
CLVII | 214 |
CLVIII | 217 |
CLIX | 223 |
CLX | 224 |
CLXI | 225 |
CLXII | 229 |
CLXIII | 231 |
CLXV | 234 |
CLXVI | 235 |
CLXVII | 238 |
CLXVIII | 243 |
CLXIX | 245 |
CLXX | 249 |
CLXXII | 252 |
CLXXIII | 255 |
CLXXIV | 256 |
CLXXV | 257 |
CLXXVI | 258 |
CLXXVII | 259 |
CLXXVIII | 261 |
CLXXIX | 262 |
CLXXX | 264 |
CLXXXII | 269 |
CLXXXIV | 270 |
CLXXXV | 271 |
CLXXXVI | 272 |
CLXXXVII | 273 |
CLXXXVIII | 277 |
CLXXXIX | 278 |
CXC | 279 |
CXCI | 280 |
CXCIII | 282 |
CXCIV | 283 |
CXCVI | 285 |
CXCVII | 289 |
291 | |
CXCIX | 293 |
CCI | 294 |
CCIII | 296 |
CCIV | 297 |
CCV | 298 |
CCVI | 299 |
CCVII | 300 |
CCVIII | 302 |
CCIX | 303 |
CCXIII | 304 |
CCXIV | 305 |
CCXV | 306 |
CCXVI | 308 |
CCXVII | 311 |
CCXIX | 312 |
CCXX | 314 |
CCXXI | 316 |
CCXXIV | 321 |
CCXXV | 322 |
CCXXVII | 329 |
CCXXVIII | 330 |
CCXXIX | 331 |
CCXXXI | 332 |
CCXXXII | 333 |
CCXXXIV | 334 |
CCXXXVI | 335 |
CCXXXVIII | 336 |
CCXXXIX | 337 |
CCXL | 338 |
CCXLIII | 345 |
CCXLIV | 346 |
CCXLV | 348 |
CCXLVI | 349 |
CCXLVII | 350 |
CCXLVIII | 351 |
CCL | 352 |
CCLI | 353 |
CCLII | 355 |
CCLIII | 357 |
CCLVI | 358 |
CCLVII | 359 |
CCLVIII | 360 |
CCLXII | 361 |
CCLXIV | 374 |
CCLXV | 376 |
CCLXVI | 383 |
CCLXVII | 384 |
CCLXIX | 385 |
CCLXX | 387 |
CCLXXI | 388 |
CCLXXII | 389 |
CCLXXIII | 390 |
CCLXXV | 391 |
CCLXXVI | 392 |
CCLXXVII | 397 |
CCLXXVIII | 398 |
CCLXXIX | 399 |
CCLXXX | 401 |
CCLXXXI | 403 |
CCLXXXII | 405 |
CCLXXXIII | 407 |
CCLXXXIV | 411 |
CCLXXXVI | 412 |
CCLXXXVII | 417 |
421 | |
425 | |
Other editions - View all
Real 802.11 Security: Wi-Fi Protected Access and 802.11i Jon Edney,William A. Arbaugh No preview available - 2004 |
Common terms and phrases
access control access point algorithm allow approach attack authentication method authentication server bits block bytes CCMP certificate Chapter cipher ciphertext client configuration connection counter create cryptographic decryption default keys denial-of-service attack dictionary attack EAP messages EAPOL EAPOL-Key encryption key example field FreeRADIUS group key handshake hash hotspot identity IEEE implement install integrity Internet Kerberos laptop layer look MAC address MAC header man-in-the-middle attack master key mobile device mode MPDU MSDU multicast nonce OpenSSL packet pairwise keys password phase plaintext problem protection pseudorandom public key RADIUS server random number replay request S-box secret key security protocol sent session key shown in Figure standard supplicant temporal keys ticket tion TKIP valid vendors weak keys WEP key Wi-Fi LAN wired wireless LAN