The security scheme for IEEE 802.11, prior to 11i, was Wired Equivalent Privacy (WEP). WEP assumed all devices on the network share a security key. The purpose of the authentication scenario is for the STA to prove that it possesses the security key. Authentication proceeds as shown in Figure 24.13 What are the benefits of the authentication scheme? The authentication scheme is incomplete. What is missing and why is it important? What is a cryptographic weakness of this scheme?
The security scheme for IEEE 802.11, prior to 11i, was Wired Equivalent Privacy (WEP). WEP assumed all devices on the network share a security key. The purpose of the authentication scenario is for the STA to prove that it possesses the security key. Authentication proceeds as shown in Figure 24.13 What are the benefits of the authentication scheme? The authentication scheme is incomplete. What is missing and why is it important? What is a cryptographic weakness of this scheme?
Related questions
Question
The security scheme for IEEE 802.11, prior to 11i, was Wired Equivalent Privacy (WEP). WEP assumed all devices on the network share a security key. The purpose of the authentication scenario is for the STA to prove that it possesses the security key. Authentication proceeds as shown in Figure 24.13
- What are the benefits of the authentication scheme?
- The authentication scheme is incomplete. What is missing and why is it important?
- What is a cryptographic weakness of this scheme?

Transcribed Image Text:STA
Station sends a request
for authentication
Station responds
with encrypted version
of challenge number
Request
Challenge
Response
Success
AP
AP sends challenge message
containting 128-bit random
number
AP decrypts challenge response.
If match, send authentication
success message
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 3 steps
