What are the benefits of this authentication scheme this


Problem

Prior to the introduction of IEEE 802.11i, the security scheme for IEEE 802.11 was Wired Equivalent Privacy (WEP). WEP assumed all devices in the network share a secret key. The purpose of the authentication scenario is for the STA to prove that it possesses the secret key. Authentication proceeds as shown in Figure. The STA sends a message to the AP requesting authentication. The AP issues a challenge, which is a sequence of 128 random bytes, sent as plaintext. The STA encrypts the challenge with the shared key and returns it to the AP. The AP decrypts the incoming value and compares it to the challenge that it sent. If there is a match, the AP confirms that authentication has succeeded.

154_WEP-Authentication.jpg

a. What are the benefits of this authentication scheme?

b. This authentication scheme is incomplete. What is missing and why is this important?

c. What is a cryptographic weakness of this scheme?

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: What are the benefits of this authentication scheme this
Reference No:- TGS02623232

Expected delivery within 24 Hours