• Complain

Jon Edney - Real 802.11 Security: Wi-Fi Protected Access and 802.11i

Here you can read online Jon Edney - Real 802.11 Security: Wi-Fi Protected Access and 802.11i full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2003, publisher: Addison-Wesley Professional, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Jon Edney Real 802.11 Security: Wi-Fi Protected Access and 802.11i
  • Book:
    Real 802.11 Security: Wi-Fi Protected Access and 802.11i
  • Author:
  • Publisher:
    Addison-Wesley Professional
  • Genre:
  • Year:
    2003
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Real 802.11 Security: Wi-Fi Protected Access and 802.11i: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Real 802.11 Security: Wi-Fi Protected Access and 802.11i" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Real 802.11 Security describes an entirely new approach to wireless LAN security based on the latest developments in Wi-Fi technology. The author team addresses the theory, implementations, and reality of Wi-Fi security. It provides an overview of security issues, explains how security works in Wi-Fi networks, and explores various security and authentication protocols. The book concludes with an in-depth discussion of real-world security issues and attack tools.

Jon Edney: author's other books


Who wrote Real 802.11 Security: Wi-Fi Protected Access and 802.11i? Find out the surname, the name of the author of the book and a list of all author's works by series.

Real 802.11 Security: Wi-Fi Protected Access and 802.11i — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Real 802.11 Security: Wi-Fi Protected Access and 802.11i" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Appendix A. Overview of the AES Block Cipher

The AES block cipher is the same as the Rijndael algorithm but with a fixed block size of 128 bits (see ). In IEEE 802.11i RSN, a further simplification is made by restricting the key size as well as the block size to 128 bits. The following description relates only to the RSN version.

You can think of the encryption of the block of data as a sort of production process in which various operations are applied repeatedly until the finished product, the ciphertext, is produced. A medieval blacksmith made a sword by starting with a strip of iron and repeatedly heating it, hammering it, adding impurities, folding it, and quenching it in cold water. By folding the metal ten times, the sword ended up with a thousand fine layers. In AES the data is the raw material loaded into a state array. The state array is processed through ten rounds of manipulation, after which it is unloaded to form the resulting encrypted block of data. At each stage of the process, the state is combined with a different round key , each of which is created and derived from the cipher key.

Although this sounds like a lot of work, one of the key advantages of the Rijndael algorithm is that it uses only simple operations such as shift, exclusive OR, and table substitution. Many encryption approaches require multiplication operations that are very expensive to implement. Rijndael uses finite field byte multiplication, a special operation that can be simplified down to a few logical operations or lookups in a 256-byte table. This appendix begins with an overview of finite field arithmetic. If you are just interested in the encryption steps for AES, skip to the next section.

Finite Field Arithmetic

When you were six years old, you probably spent quite a bit of time reciting multiplication tables and doing long additions and multiplications. You might have found it hard to remember to pass the carry from one column of digits to the next in an addition, but you did it because the teacher said, "This is the way the world works." Now you encounter finite field arithmetic, which has a different set of rules and, on first inspection, sounds like it came from outer space. Finite field arithmetic is important in cryptography and is the basis of the familiar cyclic redundancy check (CRC) used to detect errors in data packets.

Conventional arithmetic operates on an infinite range of values, even if you limit it to positive integers. However, if your entire universe is defined by a single byte, you have only 256 values to deal with. What often happens is that normal arithmetic is applied to byte values and any overflows or underflows during the conventional arithmetic are discarded. This works for many types of calculations, but in some sense discarding the carry violates the rules of conventional arithmetic. Your primary school teacher didn't talk about number universes that had only 256 values. Finite field arithmetic is defined specifically to handle such finite number universes. The rules apply to cases like single byte arithmetic so, in some sense, it is more valid than the familiar arithmetic. But let's not get too philosophical here; this type of arithmetic enables some good tricks and allows some neat shortcuts in the computations. This section is not intended to be a rigorous description of finite field mathematics; and if you are a pure mathematician, you probably won't like it. However, we do introduce the basics and explain why some of the computations used in cryptography look a little weird.

For our application, we are interested only in finite fields that can be represented by binary numbers. For purposes of finite field arithmetic, we can represent a binary number by polynomials of the form:

Equation A.1

The value of x is not important as it is only the coefficients an that we are - photo 1

The value of x is not important as it is only the coefficients a(n) that we are interested in. However if the coefficients have the value 0 or 1 and x represents the value 2, then the value of the polynomial, computed using conventional arithmetic, corresponds to the binary value.

Each of the coefficients corresponds to one bit of a binary number. So, for example, the 8-bit value 10010111 would be written as:

Equation A.2

Real 80211 Security Wi-Fi Protected Access and 80211i - image 2

or more simply:

Equation A.3

Real 80211 Security Wi-Fi Protected Access and 80211i - image 3

Treating the numbers as polynomials leads to some interesting and different behavior when you are performing arithmetic operations. This is okay, providing such treatment still follows some basic rules such as:

if A + B = C then A = B C

and if A x B = C then A = CB

In the following sections we look at the main operations in turn.

Addition

When you add two polynomials, each term is added independently; there is no concept of a carry from one term to another. For example, in conventional arithmetic

Equation A.4

In our binary representation the coefficients can be only 0 or 1 The value 2 - photo 4

In our binary representation, the coefficients can be only 0 or 1. The value 2 is not possible. Therefore, we have the rule that, when adding the coefficients, the following addition rule applies:

  • 0 + 0 = 0

  • 0 + 1 = 1

  • 1 + 0 = 1

  • 1 + 1 = 0 (there is no carry)

By a useful coincidence, this is the same result as what you get when you perform an exclusive OR operation, which is easier for digital logic than a binary addition.

Using our binary rules, the addition of the two polynomials in is:

Equation A.5

This corresponds to the binary computation Equation A6 Notice how the - photo 5

This corresponds to the binary computation:

Equation A.6

Notice how the addition has now been entirely replaced by the exclusive OR - photo 6

Notice how the addition has now been entirely replaced by the exclusive OR operation. Addition of 2 bytes under these rules is really an XOR operation, and addition cannot have a result bigger than 1 byte, which is consistent with our 1-byte universe.

Subtraction

The same logic that made addition become XOR also applies to subtraction. Suppose we want to subtract the two polynomials in (). In conventional arithmetic the result would be:

Equation A.7

The coefficient of the x term is 1 There is no 1 value in a single binary - photo 7

The coefficient of the x term is 1. There is no 1 value in a single binary digit. The subtraction table for two binary digits is:

  • 1 1 = 0

  • 1 0 = 1

  • 0 1 = 1 (there is no borrow)

  • 0 0 = 0

Once again this is the same as the XOR operation so that the binary subtraction takes the form:

Surprising but truein this byte arithmetic universe addition and subtraction - photo 8

Surprising but truein this byte arithmetic universe addition and subtraction become the same operation and are replaced by the exclusive OR operation. Notice also how this new arithmetic also obeys the rule that if A + B = C, then A = B C.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Real 802.11 Security: Wi-Fi Protected Access and 802.11i»

Look at similar books to Real 802.11 Security: Wi-Fi Protected Access and 802.11i. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Real 802.11 Security: Wi-Fi Protected Access and 802.11i»

Discussion, reviews of the book Real 802.11 Security: Wi-Fi Protected Access and 802.11i and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.