Abstract
The 802.11 standard makes extensive use of cryptographic methods for security. This chapter covers encryption, message digests, digital signatures and digital certificates. In this chapter we take a practical approach, using OpenSSL to demonstrate the concepts of cryptography.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The use of the term “encryption” in this chapter, also refers implicitly to the reverse process “decryption”. We use the term decryption when we need to distinguish it from the encryption process.
- 2.
The command-line prompts “client$” and “server$” are used to indicate the client and server hosts, respectively.
- 3.
This is the request for comment (RFC) document for the TLS protocol.
- 4.
“STA” is the IEEE nomenclature for an 802.11 device.
References
Behrouz A. Forouzan. Introduction to Cryptography and Network Security. McGraw–Hill, Berkeley, 2008.
Dominic Welsh. Codes and Cryptography. Oxford University Press, Oxford, 2004.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag London Limited
About this chapter
Cite this chapter
Holt, A., Huang, CY. (2010). Cryptography. In: 802.11 Wireless Networks. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-84996-275-9_5
Download citation
DOI: https://doi.org/10.1007/978-1-84996-275-9_5
Publisher Name: Springer, London
Print ISBN: 978-1-84996-274-2
Online ISBN: 978-1-84996-275-9
eBook Packages: Computer ScienceComputer Science (R0)