The security scheme for IEEE 802.11, prior to 11i, was Wired Equivalent Privacy (WEP). WEP assumed all devices on the network share a security key.  The purpose of the authentication scenario is for the STA to prove that it possesses the security key. Authentication proceeds as shown in Figure 24.13 What are the benefits of the authentication scheme? The authentication scheme is incomplete. What is missing and why is it important? What is a cryptographic weakness of this scheme?

icon
Related questions
Question

The security scheme for IEEE 802.11, prior to 11i, was Wired Equivalent Privacy (WEP). WEP assumed all devices on the network share a security key.  The purpose of the authentication scenario is for the STA to prove that it possesses the security key. Authentication proceeds as shown in Figure 24.13

    1. What are the benefits of the authentication scheme?
    2. The authentication scheme is incomplete. What is missing and why is it important?
    3. What is a cryptographic weakness of this scheme?

 

STA
Station sends a request
for authentication
Station responds
with encrypted version
of challenge number
Request
Challenge
Response
Success
AP
AP sends challenge message
containting 128-bit random
number
AP decrypts challenge response.
If match, send authentication
success message
Transcribed Image Text:STA Station sends a request for authentication Station responds with encrypted version of challenge number Request Challenge Response Success AP AP sends challenge message containting 128-bit random number AP decrypts challenge response. If match, send authentication success message
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps

Blurred answer