Summary of Key Hierarchies

Figures 10.3 through 10.6 summarize the key hierarchy, showing how the various keys are derived. These diagrams are provided as a quick reference prior to the detailed description of how the key derivation is implemented.

Figure 10.3. TKIP Pairwise Key Hierarchy


Figure 10.6. AES Group Key Hierarchy


Figure 10.4. TKIP Group Key Hierarchy


Figure 10.5. AES Pairwise Key Hierarchy


Real 802.11 Security(c) Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
ISBN: 0321136209
EAN: 2147483647
Year: 2005
Pages: 151 © 2008-2017.
If you may any questions please contact us: