417:"The Protected Frame field is 1 bit in length. The Protected Frame field is set to 1 if the Frame Body field contains information that has been processed by a cryptographic encapsulation algorithm. The Protected Frame field is set to 1 only within data frames of type Data and within management frames of type Management, subtype Authentication. The Protected Frame field is set to 0 in all other frames. When the bit Protected Frame field is set to 1 in a data frame, the Frame Body field is protected utilizing the cryptographic encapsulation algorithm and expanded as defined in Clause 8. Only WEP is allowed as the cryptographic encapsulation algorithm for management frames of subtype Authentication."
174:
180:
each other—that can only be decrypted by using the PMK that they already share—and if decryption of the messages was successful, this proves knowledge of the PMK. The four-way handshake is critical for protection of the PMK from malicious access points—for example, an attacker's SSID impersonating a real access point—so that the client never has to tell the access point its PMK.
179:
The four-way handshake is designed so that the access point (or authenticator) and wireless client (or supplicant) can independently prove to each other that they know the PSK/PMK, without ever disclosing the key. Instead of disclosing the key, the access point (AP) and client encrypt messages to
133:, with implementation of CCMP being mandatory since the confidentiality and integrity mechanisms of TKIP are not as robust as those of CCMP. The main purpose to implement TKIP was that the algorithm should be implementable within the capabilities of most of the old devices supporting only WEP.
121:
to establish and change the appropriate cryptographic keys. The RSN is a security network that only allows the creation of robust security network associations (RSNAs), which are a type of association used by a pair of stations (STAs) if the procedure to establish authentication or association
245:
The Group
Temporal Key (GTK) used in the network may need to be updated due to the expiration of a preset timer. When a device leaves the network, the GTK also needs to be updated. This is to prevent the device from receiving any more multicast or broadcast messages from the AP.
148:, which requires the presence of an authentication server). This process ensures that the client station (STA) is authenticated with the access point (AP). After the PSK or 802.1X authentication, a shared secret key is generated, called the
116:
IEEE 802.11i enhances IEEE 802.11-1999 by providing a Robust
Security Network (RSN) with two new protocols: the four-way handshake and the group key handshake. These utilize the authentication services and port access control described in
308:
The pairwise key hierarchy utilizes PRF-384 or PRF-512 to derive session-specific keys from a PMK, generating a PTK, which gets partitioned into a KCK and a KEK plus all the temporal keys used by the MAC to protect unicast communication.
222:
sends a nonce-value (ANonce) to the STA together with a Key Replay
Counter, which is a number that is used to match each pair of messages sent, and discard replayed messages. The STA now has all the attributes to construct the
277:
of the AES encryption algorithm. CCM combines CTR for confidentiality and CBC-MAC for authentication and integrity. CCM protects the integrity of both the MPDU Data field and selected portions of the IEEE 802.11 MPDU header.
230:(MIC), including authentication, which is really a Message Authentication and Integrity Code (MAIC), and the Key Replay Counter which will be the same as Message 1, to allow AP to match the right Message 1.
312:
The GTK shall be a random number which also gets generated by using PRF-n, usually PRF-128 or PRF-256, in this model, the group key hierarchy takes a GMK (Group Master Key) and generates a GTK.
85:
as an intermediate solution to WEP insecurities. WPA implemented a subset of a draft of 802.11i. The Wi-Fi
Alliance refers to their approved, interoperable implementation of the full 802.11i as
1047:
187:
to encrypt the traffic need to be derived. A four-way handshake is used to establish another key called the
Pairwise Transient Key (PTK). The PTK is generated by
257:
The AP sends the new GTK to each STA in the network. The GTK is encrypted using the KEK assigned to that STA, and protects the data from tampering, by use of a
304:
PRF-n - Pseudo-random function producing n bits of output, there are the 128, 192, 256, 384 and 512 versions, each of these output these number of bits.
1972:
1967:
1962:
1957:
1952:
1947:
1942:
233:
The AP verifies
Message 2, by checking MIC, RSN, ANonce and Key Replay Counter Field, and if valid constructs and sends the GTK with another MIC.
426:
1211:
600:
564:
524:
488:
452:
1254:
2022:
1888:
1629:
1624:
1614:
1609:
1604:
1599:
1594:
1589:
1579:
1574:
1569:
1564:
1554:
1549:
1544:
1539:
1524:
1519:
1514:
1509:
1504:
152:(PMK). In PSK authentication, the PMK is actually the PSK, which is typically derived from the WiFi password by putting it through a
691:
787:
164:. If an 802.1X EAP exchange was carried out, the PMK is derived from the EAP parameters provided by the authentication server.
210:
The actual messages exchanged during the handshake are depicted in the figure and explained below (all messages are sent as
753:
2058:
2048:
897:
141:
236:
The STA verifies
Message 3, by checking MIC and Key Replay Counter Field, and if valid sends a confirmation to the AP.
1323:
842:
2117:
1022:
126:
1304:
1279:
552:
RSNA relies on IEEE 802.1X to provide authentication services and uses the IEEE 802.11 key management scheme
1259:
780:
200:
94:
1688:
1249:
952:
867:
847:
761:
161:
2091:
820:
796:
183:
The PMK is designed to last the entire session and should be exposed as little as possible; therefore,
1658:
857:
721:"IEEE 802.11-2007: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications"
31:
1092:
74:
58:
2096:
957:
947:
927:
773:
613:
577:
537:
501:
463:
1269:
830:
258:
227:
78:
62:
2063:
1186:
922:
219:
674:
654:
637:
2122:
1329:
1077:
1007:
675:"IEEE 802.11i-2004 Standard Amendment 6: Medium Access Control (MAC) Security Enhancements"
655:"IEEE 802.11i-2004 Standard Amendment 6: Medium Access Control (MAC) Security Enhancements"
638:"IEEE 802.11i-2004 Standard Amendment 6: Medium Access Control (MAC) Security Enhancements"
173:
8:
695:
192:
149:
130:
1087:
184:
293:
GTK, a hierarchy consisting of a single key to protect multicast and broadcast traffic
1760:
1755:
1735:
1719:
1713:
1708:
1698:
1693:
1683:
1678:
1668:
1663:
1299:
1169:
1129:
35:
1653:
1319:
453:"IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements"
732:
125:
The standard also provides two RSNA data confidentiality and integrity protocols,
34:(WPA2). The draft standard was ratified on 24 June 2004. This standard specifies
1082:
757:
602:
IEEE 802.11i-2004: Amendment 6: Medium Access
Control (MAC) Security Enhancements
566:
IEEE 802.11i-2004: Amendment 6: Medium Access
Control (MAC) Security Enhancements
526:
IEEE 802.11i-2004: Amendment 6: Medium Access
Control (MAC) Security Enhancements
490:
IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements
1937:
1067:
1062:
982:
932:
751:
720:
609:
573:
533:
497:
459:
137:
82:
2111:
2043:
1987:
1982:
1977:
1927:
1922:
1917:
1907:
1883:
1859:
1847:
1836:
1825:
1813:
1808:
1803:
1798:
1785:
1774:
1264:
1244:
1097:
1072:
1002:
892:
837:
301:
L(Str, F, L) - From Str starting from the left, extract bits F through F+L–1.
188:
105:
2027:
2017:
1765:
1750:
1745:
1740:
1730:
1673:
1314:
1309:
1294:
1289:
1284:
1234:
432:
102:
98:
39:
203:. The handshake also yields the GTK (Group Temporal Key), used to decrypt
1899:
1639:
1393:
1274:
1239:
1229:
1206:
1201:
1196:
1191:
1174:
1159:
297:
The description of the key hierarchies uses the following two functions:
196:
118:
54:
27:
2012:
2007:
1339:
1221:
1154:
1149:
1144:
1139:
1134:
1124:
2073:
2053:
1911:
1164:
1057:
1052:
1037:
1027:
1017:
997:
992:
977:
967:
962:
942:
937:
917:
912:
907:
902:
887:
852:
226:
The STA sends its own nonce-value (SNonce) to the AP together with a
204:
51:
1344:
1116:
1107:
825:
815:
810:
274:
2068:
1864:
1830:
1779:
1724:
1619:
1584:
1559:
1534:
1529:
1499:
1494:
1489:
1483:
1477:
1472:
1467:
1462:
1456:
1450:
1445:
1440:
1435:
1429:
1423:
1418:
1413:
1408:
1353:
987:
972:
765:
136:
The initial authentication process is carried out either using a
1931:
1403:
1398:
1388:
1383:
1378:
1373:
1368:
1363:
1358:
1032:
862:
153:
1789:
1644:
1179:
1042:
882:
211:
157:
145:
1012:
877:
872:
724:
61:(WEP), while it was later incorporated into the published
199:, and STA MAC address. The product is then put through a
77:(WEP), which was shown to have security vulnerabilities.
73:
802.11i supersedes the previous security specification,
264:
The STA acknowledges the new GTK and replies to the AP.
429:(WAPI), China's centralized wireless security method
93:(Robust Security Network). 802.11i makes use of the
290:Pairwise key hierarchy, to protect unicast traffic
2109:
46:clause of the original standard with a detailed
427:WLAN Authentication and Privacy Infrastructure
781:
750:Vulnerability in the WPA2 protocol, hole196
122:between them includes the 4-Way Handshake.
81:(WPA) had previously been introduced by the
733:"The Evolution of 802.11 Wireless Security"
26:for short, is an amendment to the original
788:
774:
249:To handle the updating, 802.11i defines a
612:, 2004-07-23, p. 43, archived from
536:, 2004-07-23, p. 14, archived from
500:, 2004-07-23, p. 14, archived from
412:
576:, 2004-07-23, p. 5, archived from
2110:
320:
253:that consists of a two-way handshake:
240:
769:
445:
167:
111:
68:
669:
667:
315:
13:
795:
286:RSNA defines two key hierarchies:
191:the following attributes: PMK, AP
144:exchange through 802.1X (known as
14:
2134:
744:
664:
195:(ANonce), STA nonce (SNonce), AP
281:
268:
172:
275:Counter with CBC-MAC (CCM) mode
692:"Section of MAC frame formats"
684:
647:
630:
593:
557:
517:
481:
101:, whereas WEP and WPA use the
1:
439:
50:clause. In the process, the
462:. 2004-07-23. Archived from
95:Advanced Encryption Standard
7:
420:
162:cryptographic hash function
10:
2139:
2092:IEEE Standards Association
44:Authentication and privacy
2082:
2036:
2000:
1898:
1638:
1338:
1220:
1115:
1106:
803:
32:Wi-Fi Protected Access II
207:and broadcast traffic.
75:Wired Equivalent Privacy
59:Wired Equivalent Privacy
2118:Cryptographic protocols
2097:Category:IEEE standards
154:key derivation function
140:(PSK), or following an
738:. ITFFROC. 2010-04-18.
228:Message Integrity Code
201:pseudo-random function
79:Wi-Fi Protected Access
42:, replacing the short
413:Protected Frame field
273:CCMP is based on the
16:IEEE standard version
326:Frame Control field
327:
321:Frame Control field
251:Group Key Handshake
241:Group key handshake
150:Pairwise Master Key
756:2015-11-13 at the
325:
168:Four-way handshake
112:Protocol operation
69:Replacement of WEP
2105:
2104:
1996:
1995:
410:
409:
357:Power Management
336:Protocol Version
316:MAC frame formats
40:wireless networks
30:, implemented as
20:IEEE 802.11i-2004
2130:
1113:
1112:
790:
783:
776:
767:
766:
739:
737:
728:
707:
706:
704:
703:
694:. Archived from
688:
682:
681:
679:
671:
662:
661:
659:
651:
645:
644:
642:
634:
628:
626:
625:
624:
618:
607:
597:
591:
590:
589:
588:
582:
571:
561:
555:
554:
549:
548:
542:
531:
521:
515:
514:
513:
512:
506:
495:
485:
479:
477:
475:
474:
468:
457:
449:
363:Protected Frame
328:
324:
176:
63:IEEE 802.11-2007
2138:
2137:
2133:
2132:
2131:
2129:
2128:
2127:
2108:
2107:
2106:
2101:
2078:
2032:
1992:
1894:
1642:
1634:
1342:
1334:
1216:
1102:
799:
794:
758:Wayback Machine
747:
742:
735:
731:
719:
710:
701:
699:
690:
689:
685:
677:
673:
672:
665:
657:
653:
652:
648:
640:
636:
635:
631:
622:
620:
619:on May 17, 2005
616:
605:
599:
598:
594:
586:
584:
583:on May 17, 2005
580:
569:
563:
562:
558:
546:
544:
543:on May 17, 2005
540:
529:
523:
522:
518:
510:
508:
507:on May 17, 2005
504:
493:
487:
486:
482:
472:
470:
469:on May 17, 2005
466:
455:
451:
450:
446:
442:
423:
415:
351:More Fragments
323:
318:
284:
271:
243:
170:
114:
71:
38:mechanisms for
17:
12:
11:
5:
2136:
2126:
2125:
2120:
2103:
2102:
2100:
2099:
2094:
2089:
2083:
2080:
2079:
2077:
2076:
2071:
2066:
2061:
2056:
2051:
2046:
2040:
2038:
2034:
2033:
2031:
2030:
2025:
2020:
2015:
2010:
2004:
2002:
1998:
1997:
1994:
1993:
1991:
1990:
1985:
1980:
1975:
1970:
1965:
1960:
1955:
1950:
1945:
1940:
1935:
1925:
1920:
1915:
1904:
1902:
1896:
1895:
1893:
1892:
1880:
1877:
1874:
1871:
1868:
1856:
1853:
1850:
1845:
1842:
1839:
1834:
1822:
1819:
1816:
1811:
1806:
1801:
1796:
1793:
1783:
1771:
1768:
1763:
1758:
1753:
1748:
1743:
1738:
1733:
1728:
1716:
1711:
1706:
1701:
1696:
1691:
1686:
1681:
1676:
1671:
1666:
1661:
1656:
1650:
1648:
1636:
1635:
1633:
1632:
1627:
1622:
1617:
1612:
1607:
1602:
1597:
1592:
1587:
1582:
1577:
1572:
1567:
1562:
1557:
1552:
1547:
1542:
1537:
1532:
1527:
1522:
1517:
1512:
1507:
1502:
1497:
1492:
1487:
1480:
1475:
1470:
1465:
1460:
1453:
1448:
1443:
1438:
1433:
1426:
1421:
1416:
1411:
1406:
1401:
1396:
1391:
1386:
1381:
1376:
1371:
1366:
1361:
1356:
1350:
1348:
1336:
1335:
1333:
1332:
1327:
1317:
1312:
1307:
1302:
1297:
1292:
1287:
1282:
1277:
1272:
1267:
1262:
1257:
1252:
1247:
1242:
1237:
1232:
1226:
1224:
1218:
1217:
1215:
1214:
1209:
1204:
1199:
1194:
1189:
1184:
1183:
1182:
1172:
1167:
1162:
1157:
1152:
1147:
1142:
1137:
1132:
1127:
1121:
1119:
1110:
1104:
1103:
1101:
1100:
1095:
1090:
1085:
1080:
1075:
1070:
1065:
1060:
1055:
1050:
1045:
1040:
1035:
1030:
1025:
1020:
1015:
1010:
1005:
1000:
995:
990:
985:
980:
975:
970:
965:
960:
955:
950:
945:
940:
935:
930:
925:
920:
915:
910:
905:
900:
895:
890:
885:
880:
875:
870:
865:
860:
855:
850:
845:
840:
835:
834:
833:
823:
818:
813:
807:
805:
801:
800:
797:IEEE standards
793:
792:
785:
778:
770:
764:
763:
746:
745:External links
743:
741:
740:
729:
716:
715:
714:
709:
708:
683:
663:
660:. p. 165.
646:
629:
610:IEEE Standards
592:
574:IEEE Standards
556:
534:IEEE Standards
516:
498:IEEE Standards
480:
460:IEEE Standards
443:
441:
438:
437:
436:
430:
422:
419:
414:
411:
408:
407:
404:
401:
398:
395:
392:
389:
386:
383:
380:
377:
374:
368:
367:
364:
361:
358:
355:
352:
349:
346:
343:
340:
337:
334:
322:
319:
317:
314:
306:
305:
302:
295:
294:
291:
283:
280:
270:
267:
266:
265:
262:
242:
239:
238:
237:
234:
231:
224:
214:-Key frames):
169:
166:
138:pre-shared key
113:
110:
89:, also called
83:Wi-Fi Alliance
70:
67:
15:
9:
6:
4:
3:
2:
2135:
2124:
2121:
2119:
2116:
2115:
2113:
2098:
2095:
2093:
2090:
2088:
2085:
2084:
2081:
2075:
2072:
2070:
2067:
2065:
2062:
2060:
2057:
2055:
2052:
2050:
2047:
2045:
2042:
2041:
2039:
2035:
2029:
2026:
2024:
2021:
2019:
2016:
2014:
2011:
2009:
2006:
2005:
2003:
1999:
1989:
1986:
1984:
1981:
1979:
1976:
1974:
1971:
1969:
1966:
1964:
1961:
1959:
1956:
1954:
1951:
1949:
1946:
1944:
1941:
1939:
1936:
1933:
1929:
1926:
1924:
1921:
1919:
1916:
1913:
1909:
1906:
1905:
1903:
1901:
1897:
1890:
1886:
1885:
1881:
1878:
1875:
1872:
1869:
1866:
1862:
1861:
1857:
1854:
1851:
1849:
1846:
1843:
1840:
1838:
1835:
1832:
1828:
1827:
1823:
1820:
1817:
1815:
1812:
1810:
1807:
1805:
1802:
1800:
1797:
1794:
1791:
1787:
1784:
1781:
1777:
1776:
1772:
1769:
1767:
1764:
1762:
1759:
1757:
1754:
1752:
1749:
1747:
1744:
1742:
1739:
1737:
1734:
1732:
1729:
1726:
1722:
1721:
1717:
1715:
1712:
1710:
1707:
1705:
1702:
1700:
1697:
1695:
1692:
1690:
1687:
1685:
1682:
1680:
1677:
1675:
1672:
1670:
1667:
1665:
1662:
1660:
1657:
1655:
1652:
1651:
1649:
1646:
1641:
1637:
1631:
1628:
1626:
1623:
1621:
1618:
1616:
1613:
1611:
1608:
1606:
1603:
1601:
1598:
1596:
1593:
1591:
1588:
1586:
1583:
1581:
1578:
1576:
1573:
1571:
1568:
1566:
1563:
1561:
1558:
1556:
1553:
1551:
1548:
1546:
1543:
1541:
1538:
1536:
1533:
1531:
1528:
1526:
1523:
1521:
1518:
1516:
1513:
1511:
1508:
1506:
1503:
1501:
1498:
1496:
1493:
1491:
1488:
1486:
1485:
1481:
1479:
1476:
1474:
1471:
1469:
1466:
1464:
1461:
1459:
1458:
1454:
1452:
1449:
1447:
1444:
1442:
1439:
1437:
1434:
1432:
1431:
1427:
1425:
1422:
1420:
1417:
1415:
1412:
1410:
1407:
1405:
1402:
1400:
1397:
1395:
1392:
1390:
1387:
1385:
1382:
1380:
1377:
1375:
1372:
1370:
1367:
1365:
1362:
1360:
1357:
1355:
1352:
1351:
1349:
1346:
1341:
1337:
1331:
1328:
1325:
1321:
1318:
1316:
1313:
1311:
1308:
1306:
1303:
1301:
1298:
1296:
1293:
1291:
1288:
1286:
1283:
1281:
1278:
1276:
1273:
1271:
1268:
1266:
1263:
1261:
1258:
1256:
1253:
1251:
1248:
1246:
1243:
1241:
1238:
1236:
1233:
1231:
1228:
1227:
1225:
1223:
1219:
1213:
1210:
1208:
1205:
1203:
1200:
1198:
1195:
1193:
1190:
1188:
1185:
1181:
1180:WiMAX · d · e
1178:
1177:
1176:
1173:
1171:
1168:
1166:
1163:
1161:
1158:
1156:
1153:
1151:
1148:
1146:
1143:
1141:
1138:
1136:
1133:
1131:
1128:
1126:
1123:
1122:
1120:
1118:
1114:
1111:
1109:
1105:
1099:
1096:
1094:
1091:
1089:
1086:
1084:
1081:
1079:
1076:
1074:
1071:
1069:
1066:
1064:
1061:
1059:
1056:
1054:
1051:
1049:
1046:
1044:
1041:
1039:
1036:
1034:
1031:
1029:
1026:
1024:
1021:
1019:
1016:
1014:
1011:
1009:
1006:
1004:
1001:
999:
996:
994:
991:
989:
986:
984:
981:
979:
976:
974:
971:
969:
966:
964:
961:
959:
956:
954:
951:
949:
946:
944:
941:
939:
936:
934:
931:
929:
926:
924:
921:
919:
916:
914:
911:
909:
906:
904:
901:
899:
896:
894:
891:
889:
886:
884:
881:
879:
876:
874:
871:
869:
866:
864:
861:
859:
856:
854:
851:
849:
846:
844:
841:
839:
836:
832:
829:
828:
827:
824:
822:
819:
817:
814:
812:
809:
808:
806:
802:
798:
791:
786:
784:
779:
777:
772:
771:
768:
762:
759:
755:
752:
749:
748:
734:
730:
727:. 2007-03-08.
726:
722:
718:
717:
712:
711:
698:on 2018-04-27
697:
693:
687:
676:
670:
668:
656:
650:
643:. p. 33.
639:
633:
627:(Broken Link)
615:
611:
604:
603:
596:
579:
575:
568:
567:
560:
553:
539:
535:
528:
527:
520:
503:
499:
492:
491:
484:
478:(Broken Link)
465:
461:
454:
448:
444:
434:
431:
428:
425:
424:
418:
405:
402:
399:
396:
393:
390:
387:
384:
381:
378:
375:
373:
370:
369:
365:
362:
359:
356:
353:
350:
347:
344:
341:
338:
335:
333:
330:
329:
313:
310:
303:
300:
299:
298:
292:
289:
288:
287:
282:Key hierarchy
279:
276:
269:CCMP overview
263:
260:
256:
255:
254:
252:
247:
235:
232:
229:
225:
221:
217:
216:
215:
213:
208:
206:
202:
198:
194:
190:
189:concatenating
186:
181:
177:
175:
165:
163:
159:
155:
151:
147:
143:
139:
134:
132:
128:
123:
120:
109:
107:
106:stream cipher
104:
100:
96:
92:
88:
84:
80:
76:
66:
64:
60:
56:
53:
49:
45:
41:
37:
33:
29:
25:
21:
2086:
1882:
1858:
1824:
1773:
1718:
1703:
1482:
1455:
1428:
700:. Retrieved
696:the original
686:
649:
632:
621:, retrieved
614:the original
601:
595:
585:, retrieved
578:the original
565:
559:
551:
545:, retrieved
538:the original
525:
519:
509:, retrieved
502:the original
489:
483:
471:. Retrieved
464:the original
447:
433:IEEE 802.1AE
416:
371:
331:
311:
307:
296:
285:
272:
250:
248:
244:
209:
182:
178:
171:
135:
124:
115:
99:block cipher
90:
86:
72:
47:
43:
23:
19:
18:
2123:IEEE 802.11
1659:legacy mode
197:MAC address
119:IEEE 802.1X
28:IEEE 802.11
2112:Categories
2037:Superseded
1108:802 series
702:2018-04-27
623:2010-04-09
587:2010-04-09
547:2010-04-09
511:2010-04-09
473:2007-12-21
440:References
360:More Data
156:that uses
65:standard.
55:deprecated
1912:Bluetooth
205:multicast
52:amendment
2087:See also
2044:754-1985
2001:Proposed
1345:Ethernet
831:Revision
754:Archived
421:See also
348:From DS
342:Subtype
332:Subfield
48:Security
36:security
2028:P1906.1
1889:Wi-Fi 8
1865:Wi-Fi 7
1831:Wi-Fi 6
1780:Wi-Fi 5
1725:Wi-Fi 4
804:Current
713:General
382:4 bits
379:2 bits
376:2 bits
366:Orders
160:as the
57:broken
24:802.11i
1932:Zigbee
1900:802.15
1640:802.11
878:1149.1
435:MACsec
406:1 bit
403:1 bit
400:1 bit
397:1 bit
394:1 bit
391:1 bit
388:1 bit
385:1 bit
354:Retry
345:To DS
97:(AES)
2023:P1823
2018:P1699
2013:P1619
2008:P1363
1790:WiGig
1654:-1997
1645:Wi-Fi
1354:-1983
1340:802.3
1222:802.1
1098:42010
1093:29148
1088:16326
1083:16085
1078:14764
1073:12207
1068:11073
736:(PDF)
678:(PDF)
658:(PDF)
641:(PDF)
617:(PDF)
606:(PDF)
581:(PDF)
570:(PDF)
541:(PDF)
530:(PDF)
505:(PDF)
494:(PDF)
467:(PDF)
456:(PDF)
339:Type
212:EAPOL
193:nonce
158:SHA-1
146:EAPOL
22:, or
2074:1471
2069:1364
2064:1362
2059:1233
2054:1219
1324:LACP
1063:2050
1058:2030
1053:1905
1048:1904
1043:1902
1038:1901
1033:1900
1028:1855
1023:1850
1018:1849
1013:1815
1008:1801
1003:1800
998:1733
993:1722
988:1685
983:1675
978:1667
973:1666
968:1619
963:1613
958:1603
953:1596
948:1588
943:1584
938:1547
933:1541
928:1516
923:1497
918:1451
913:1394
908:1355
903:1284
898:1278
893:1275
888:1164
883:1154
873:1076
868:1016
863:1014
858:1003
725:IEEE
372:Bits
223:PTK.
218:The
185:keys
131:CCMP
129:and
127:TKIP
87:WPA2
2049:830
1973:.4z
1968:.4g
1963:.4f
1958:.4e
1953:.4d
1948:.4c
1943:.4b
1938:.4a
1265:Qbb
1260:Qaz
1255:Qay
1250:Qat
1245:Qav
1212:.24
1207:.22
1202:.21
1197:.20
1192:.18
1187:.17
1175:.16
1170:.14
1165:.12
1160:.10
1117:802
853:896
848:829
843:828
838:854
826:754
821:730
816:693
811:488
259:MIC
142:EAP
103:RC4
91:RSN
2114::
1988:.7
1983:.6
1978:.5
1928:.4
1923:.3
1918:.2
1908:.1
1884:bn
1879:bk
1876:bi
1873:bh
1870:bf
1860:be
1855:bd
1852:bc
1848:bb
1844:ba
1841:az
1837:ay
1826:ax
1821:aq
1818:ak
1814:aj
1809:ai
1804:ah
1799:af
1795:ae
1786:ad
1775:ac
1770:aa
1630:df
1625:de
1620:dd
1615:db
1610:da
1605:cz
1600:cy
1595:cx
1590:cw
1585:cv
1580:cu
1575:ct
1570:cs
1565:cr
1560:cq
1555:cp
1550:cn
1545:cm
1540:ck
1535:ch
1530:cg
1525:ce
1520:cd
1515:cc
1510:cb
1505:ca
1500:bz
1495:by
1490:bu
1484:bt
1478:ba
1473:az
1468:av
1463:au
1457:at
1451:aq
1446:an
1441:ak
1436:ah
1430:af
1424:ae
1419:ad
1414:ac
1409:ab
1330:BA
1320:AX
1315:AS
1310:aq
1305:ak
1300:ah
1295:ag
1290:AE
1285:ad
1280:AB
1155:.9
1150:.8
1145:.7
1140:.6
1135:.5
1130:.4
1125:.2
760:,
723:.
666:^
608:,
572:,
550:,
532:,
496:,
458:.
220:AP
108:.
1934:)
1930:(
1914:)
1910:(
1891:)
1887:(
1867:)
1863:(
1833:)
1829:(
1792:)
1788:(
1782:)
1778:(
1766:z
1761:y
1756:w
1751:v
1746:u
1741:s
1736:r
1731:p
1727:)
1723:(
1720:n
1714:k
1709:j
1704:i
1699:h
1694:g
1689:f
1684:e
1679:d
1674:c
1669:b
1664:a
1647:)
1643:(
1404:z
1399:y
1394:x
1389:u
1384:j
1379:i
1374:e
1369:d
1364:b
1359:a
1347:)
1343:(
1326:)
1322:(
1275:X
1270:w
1240:Q
1235:p
1230:D
789:e
782:t
775:v
705:.
680:.
476:.
261:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.