[RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Errata] [Info page] | www.rfc-editor.org
Network Working Group D. Whiting| www.ietf.org
NOTE: This documentation is still under development. Please check back on a regular basis to obtain the latest updates. If you have any feedback on the documentation, please post your comments to the Forum.| www.aircrack-ng.org
Here is my notes about Chapter 3 (Encryption Ciphers & Methods) of CWSP Study Guide. Symmetric & Asymmetric Algorithms In symmetric algorithm, both the encrypting & decrypting parties s…| mrn-cciew
In IEEE 802.11-2007 standard define 3 encryption methods that operate at layer 2 of OSI model (WEP, TKIP, CCMP). These used to encrypt upper layer information of 802.11 data frames what has MSDU pa…| mrn-cciew