CWSPStudyTSN and RSN

TSN and RSN

The advantage for dynamic encryption is that the encryption key cannot be compromised by, for example, social engineering. With static keys, all the keys need to be replaced in your environment. With dynamic encryption, it is not possible to compromise the key with social engineering since the user is not aware of the keys. Another …

CWSPStudyHandshakes

Handshakes

In previous blogs, I talked about the 4-way handshake. During this process, the PTK and the GTK are sent and installed. This is done by EAP over LAN-key frames (EAPOL-keys), but this is not used only by the 4-way handshake. The other handshakes that use this process are: – Group Key handshake – PeerKey handshake …