We kindly inform you that we have also www.cyberbajt.com Zamknij

Search results:

Raporty i testy urządzeń

  • wróć do listy testów i raportów

    The WLAN security

    Stanisław Sirko, 2007-07-11, Drukuj
  • 6.

    CCMP Protocol

    The CCMP is the next protocols set introduced in the 802.11i standard and constitutes a specification basic of 802.11i. As the TKIP protocol ensure integrity and data privacy but it uses a stronger algorithms. The CCMP protocol is based on symmetrical blocked algorithm AES (Advanced Encryption Standard) and on its specific block tied CCM mode is realized integrity and privacy. The AES Algorithm was wide analysed at international scale, carried out by cryptography experts and nowadays it is acknowledged as safety.



    The AES algorithm uses 128 bite keys to needs of the CCMP protocol. As similarly as in TKIP in CCMP it was applied 48- bite vector IV (called the number of package PN) and variant of the MIC code. Applying the strong AES code causes that there is no need of creating the separate unique key for every package, and so in CCMP such a function was not predicted. CCMP uses the same key both for data encryption as well as creating the checksum. The checksum used in CCMP of announcement integrity is regarded much stronger than the Michael code, applied in TKIP. On account of need for older network devices exchange by the CCMP algorithm implementation, the encryption is usually helds with separate electronic system in order to avoid encryption influence to rate and bandwidth of 802.11i network.


    The CCMP algorithm is the best solution at security designing in the WLAN webs and should substitute the TKIP and WEP algorithm, as wider it is possible.

  • dalej wstecz

Hold on there sparky! Using IE? Really? Come on now. You really need to move on and get a better browser.