Document Type
Conference Proceeding
Publication Date
2005
Publication Title
The Ninth Canadian Workshop on Information Theory (CWIT)
First Page
280
Keywords
Security, 802.11, WLAN, RSA, authentication, key distribution
Last Page
283
Abstract
It is well known that the data confidentiality algorithm, called Wired Equivalent Privacy (WEP), offerred by the original IEEE 802.11 is not secure mainly due to its improper implementation of RC4 algorithm [3], [4]. The IEEE 802.11 Task Group ’I’ (TGi) has designed two options to address this problem. One is called Temporal Key Integrity Protocol (TKIP), intended to be used as a short-term patch for currently deployed equipment. The other one uses Advanced Encryption Standard (AES), a powerful block cipher recommended by NIST to replace DES in 2000, as a long-term solution
Recommended Citation
Zheng, Zhong; Tepe, Kemal; and Wu, Huapeng. (2005). Applying Unbalanced RSA to Authentication and Key Distribution in 802.11. The Ninth Canadian Workshop on Information Theory (CWIT), 280-283.
https://scholar.uwindsor.ca/electricalengpub/9