Cryptography and Network Security

  1. Wireless Network Security
    1. Wireless Security Challenges
      1. Open Medium Vulnerabilities
        1. Broadcast Nature
          1. Signal Propagation
          2. Eavesdropping Risks
            1. Passive Monitoring
              1. Signal Interception
              2. Rogue Access Points
                1. Evil Twin Attacks
                  1. Unauthorized Access Points
                  2. Jamming Attacks
                    1. Signal Interference
                      1. Denial of Service
                      2. Physical Security Issues
                        1. Device Theft
                          1. Tampering
                        2. IEEE 802.11 Wireless LAN Security
                          1. 802.11 Security Architecture
                            1. Security Services
                              1. Security Mechanisms
                              2. Wired Equivalent Privacy (WEP)
                                1. WEP Protocol
                                  1. RC4 Stream Cipher
                                    1. CRC-32 Integrity Check
                                    2. WEP Key Management
                                      1. Shared Keys
                                        1. Key Distribution
                                        2. Security Weaknesses
                                          1. IV Reuse
                                            1. Weak Keys
                                              1. CRC Vulnerabilities
                                                1. Key Recovery Attacks
                                              2. Wi-Fi Protected Access (WPA)
                                                1. WPA Protocol
                                                  1. 802.1X Authentication
                                                    1. Dynamic Key Management
                                                    2. Temporal Key Integrity Protocol (TKIP)
                                                      1. Key Mixing
                                                        1. Message Integrity Check
                                                          1. Replay Protection
                                                          2. WPA Security Improvements
                                                            1. Stronger Authentication
                                                              1. Dynamic Keys
                                                            2. WPA2 and WPA3
                                                              1. WPA2 Protocol
                                                                1. AES Encryption
                                                                  1. CCMP Protocol
                                                                    1. Robust Security Network (RSN)
                                                                    2. WPA3 Enhancements
                                                                      1. Simultaneous Authentication of Equals (SAE)
                                                                        1. Password-based Authentication
                                                                          1. Forward Secrecy
                                                                          2. Enhanced Open
                                                                            1. 192-bit Security Suite
                                                                            2. WPA3 Security Features
                                                                              1. Protection Against Offline Attacks
                                                                                1. Forward Secrecy
                                                                                  1. Simplified Configuration
                                                                                2. Robust Security Network (RSN)
                                                                                  1. RSN Architecture
                                                                                    1. Security Capabilities
                                                                                      1. Authentication Framework
                                                                                      2. Key Management
                                                                                        1. Pairwise Keys
                                                                                          1. Group Keys
                                                                                            1. Key Hierarchy
                                                                                            2. 4-Way Handshake
                                                                                              1. Key Confirmation
                                                                                                1. Key Installation
                                                                                            3. Bluetooth Security
                                                                                              1. Bluetooth Security Architecture
                                                                                                1. Bluetooth Authentication
                                                                                                  1. Bluetooth Encryption
                                                                                                    1. Bluetooth Security Threats
                                                                                                    2. Cellular Network Security
                                                                                                      1. GSM Security
                                                                                                        1. 3G Security
                                                                                                          1. 4G LTE Security
                                                                                                            1. 5G Security