• Alan Holt
  • Chi-Yu Huang
Part of the Computer Communications and Networks book series (CCN)


The 802.11 standard makes extensive use of cryptographic methods for security. This chapter covers encryption, message digests, digital signatures and digital certificates. In this chapter we take a practical approach, using OpenSSL to demonstrate the concepts of cryptography.


Block Cipher Stream Cipher Certificate Authority Digital Certificate Certificate Revocation List 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 12.
    Behrouz A. Forouzan. Introduction to Cryptography and Network Security. McGraw–Hill, Berkeley, 2008. Google Scholar
  2. 40.
    Dominic Welsh. Codes and Cryptography. Oxford University Press, Oxford, 2004. Google Scholar

Copyright information

© Springer-Verlag London Limited 2010

Authors and Affiliations

  • Alan Holt
    • 1
  • Chi-Yu Huang
    • 2
  1. 1.IP PerformanceBristolUK
  2. 2.Tata Technologies LtdBristolUK

Personalised recommendations