Open Access. Powered by Scholars. Published by Universities.®
Electrical and Computer Engineering Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Electrical and Computer Engineering
Applying Unbalanced Rsa To Authentication And Key Distribution In 802.11, Zhong Zheng, Kemal Tepe, Huapeng Wu
Applying Unbalanced Rsa To Authentication And Key Distribution In 802.11, Zhong Zheng, Kemal Tepe, Huapeng Wu
Electrical and Computer Engineering Publications
It is well known that the data confidentiality algorithm, called Wired Equivalent Privacy (WEP), offerred by the original IEEE 802.11 is not secure mainly due to its improper implementation of RC4 algorithm [3], [4]. The IEEE 802.11 Task Group āIā (TGi) has designed two options to address this problem. One is called Temporal Key Integrity Protocol (TKIP), intended to be used as a short-term patch for currently deployed equipment. The other one uses Advanced Encryption Standard (AES), a powerful block cipher recommended by NIST to replace DES in 2000, as a long-term solution