Question:
a) In a wireless network where WEP is enforced as security mechanism, what procedure would the network manager adopt for changing WEP default keys.
b) Using Plaintext A (11010011) and Plaintext B (00101101), show how XOR operations can be used to implement key stream attacks.
c) What are the two layers requiring protection in RSN and WPA? Why the pairwise transient key (PTK) of RSN/TKIP and WPA is a total of 512 bits long.