Professional Documents
Culture Documents
2.Each entity has a pair of mathematically related keys which are Private key
and public key
4.For guard agianst replay attacks we can set an expiration timeout (i.e. if the
message does not arrive until the timeout, we don't accept it)
5.
7.symmetric key encryption use the same key for both encryption and
decryption
12.
13.In WPA, the encryption key is changed after every frame using Temporary
Key Integrity ProtocoI