Skip to content

A blog about Wireless, technology and what not.

  • Home
  • About
security

CCMP: Decrypting Frames and Calculating the MIC for WPA2

In the previous post, we explored the details of the RSNA 4-Way Handshake and key generation. In this post, we’ll focus on decrypting and calculating […]

Read More março 25, 2025
security

A Deep Dive into RSNA: Key Management and WPA2 Personal Security

802.11i RSN defined the RSNA (Robust Security Network Association), which significantly improved the authentication and encryption mechanisms used in Wi-Fi networks. Prior to RSNA, networks […]

Read More fevereiro 27, 2025
security

AES Key Wrap: How It Works

When we need to securely send a key, we encrypt it. That’s exactly what AES Key Wrap does—it provides a standardized way to encrypt a […]

Read More fevereiro 25, 2025
security

How PBKDF2 Converts a Passphrase to a Key

PBKDF2 (Password-Based Key Derivation Function 2) WPA2-PSK (Wi-Fi Protected Access 2 – Pre-Shared Key) employs CCMP-AES encryption with a pre-shared key (PSK). However, user-entered passphrases […]

Read More fevereiro 12, 2025
security

Hash Functions in 802.11: HMAC and PRF Explained

Hash functions play a crucial role in various applications, including hash maps, integrity checks, pseudo-random value generation, and transforming a passphrase into a usable key. […]

Read More fevereiro 6, 2025
security

How SHA-1 Works: A Step-by-Step Breakdown

Hash functions are one-way functions, meaning they take some input data and generate a fixed-size output that resembles encrypted data but cannot be reversed to […]

Read More janeiro 30, 2025
security

Understanding FCS in 802.11: CRC-32 Explained

FCS (Frame Check Sequence) is the name of the 802.11 MAC address frame field, which is calculated over both the 802.11 header and frame body. […]

Read More janeiro 28, 2025
security

Understanding the Galois/Counter Mode (GCM) Encryption in WPA-3

WPA3 uses advanced encryption techniques to protect data confidentiality and integrity in wireless networks. The encryption method it uses is Galois/Counter Mode (GCM), which enhances […]

Read More janeiro 24, 2025
security

CCM Authenticated Encryption: A Detailed Walkthrough

In my last post, I talked about encryption modes, covering the outdated and not-so-great ECB, along with CBC and CTR. Now let’s dive into CCM […]

Read More janeiro 17, 2025
security

Understanding AES Encryption Modes: From ECB to CBC and CTR

In previous posts, we discussed how AES encryption works, breaking down the process of encrypting a 128-bit (16-byte) plaintext into a ciphertext of the same […]

Read More janeiro 12, 2025

Paginação de posts

1 2 Próximo
  • março 2025
  • fevereiro 2025
  • janeiro 2025
  • dezembro 2024
  • novembro 2024
  • outubro 2024

Categories

  • security
  • simulation
  • WISP
Copyright © All rights reserved. Theme Marsh Blog by Creativ Themes