Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

University of Windsor

Series

2005

Articles 1 - 1 of 1

Full-Text Articles in Engineering

Applying Unbalanced Rsa To Authentication And Key Distribution In 802.11, Zhong Zheng, Kemal Tepe, Huapeng Wu Jan 2005

Applying Unbalanced Rsa To Authentication And Key Distribution In 802.11, Zhong Zheng, Kemal Tepe, Huapeng Wu

Electrical and Computer Engineering Publications

It is well known that the data confidentiality algorithm, called Wired Equivalent Privacy (WEP), offerred by the original IEEE 802.11 is not secure mainly due to its improper implementation of RC4 algorithm [3], [4]. The IEEE 802.11 Task Group ā€™Iā€™ (TGi) has designed two options to address this problem. One is called Temporal Key Integrity Protocol (TKIP), intended to be used as a short-term patch for currently deployed equipment. The other one uses Advanced Encryption Standard (AES), a powerful block cipher recommended by NIST to replace DES in 2000, as a long-term solution