ITWissen.info - Tech know how online

shared key authentication (WLAN) (SKA)

In addition to Open SystemAuthentication ( OSA), another authentication method used for authentication in 802.11WLANs is Shared Key Authentication (SKA). Shared Key Authentication works according to the challenge- response method and uses a secret key.

Authentication with Wired Equivalent Privacy(WEP) recognizes the two instances initiator, which is the client, and responder, which is the wireless access point ( WAP). During authentication, the initiator sends a request to the responder, which responds with a challenge to the initiator. This can be a request for the mail address or the telephone number. The client answers this challenge with a response to the access point. It uses a 64-bit or 128-bit standard key to encrypt the challenge.

The access point decrypts the response text with the WEP key that corresponds to the client 's standard key. Itverifies the response and sends the result to the client, which can use it to authenticate.

Informations:
Englisch: shared key authentication (WLAN) - SKA
Updated at: 27.12.2011
#Words: 146
Links: indium (In), open systems architecture (OSA), authentication, method, response (RSP)
Translations: DE
Sharing:    

All rights reserved DATACOM Buchverlag GmbH © 2024