The Ninth Canadian Workshop on Information Theory (CWIT)
Security, 802.11, WLAN, RSA, authentication, key distribution
It is well known that the data confidentiality algorithm, called Wired Equivalent Privacy (WEP), offerred by the original IEEE 802.11 is not secure mainly due to its improper implementation of RC4 algorithm , . The IEEE 802.11 Task Group ’I’ (TGi) has designed two options to address this problem. One is called Temporal Key Integrity Protocol (TKIP), intended to be used as a short-term patch for currently deployed equipment. The other one uses Advanced Encryption Standard (AES), a powerful block cipher recommended by NIST to replace DES in 2000, as a long-term solution
Zheng, Zhong; Tepe, Kemal; and Wu, Huapeng. (2005). Applying Unbalanced RSA to Authentication and Key Distribution in 802.11. The Ninth Canadian Workshop on Information Theory (CWIT), 280-283.