A Scheme for Key Management on Alternate Temporal Key Hash

Volume: 1, Issue: 1, Pages: 8 - 13
Published: Jul 1, 2005
Abstract
Wired equivalent privacy encryption of IEEE 802.11 standard is based on the RC4 stream cipher, but the weakness in its Initialization Vector (IV) derivation causes the Key Scheduling Algorithm (KSA) of RC4 to leak out the information about the secret key. It is shared among the particular participants in the Wireless LAN (WLAN). Housley et al. proposed an Alternate Temporal Key Hash (ATKH) to solve the weakness of the KSA; they defeated the...
Paper Details
Title
A Scheme for Key Management on Alternate Temporal Key Hash
Published Date
Jul 1, 2005
Volume
1
Issue
1
Pages
8 - 13
Citation AnalysisPro
  • Scinapse’s Top 10 Citation Journals & Affiliations graph reveals the quality and authenticity of citations received by a paper.
  • Discover whether citations have been inflated due to self-citations, or if citations include institutional bias.