Added on -2020-02-18

| 10 pages| 2284 words| 172 views

Trusted by 2+ million users,

1000+ happy students everyday

Running head: WIRELESS NETWORKSWireless NetworksName of the StudentName of the UniversityAuthor’s name

1WIRELESS NETWORKSTable of ContentsPart 1- Three Data Encryption Standards of WIMAX........................................................2Part 2- Security Challenges of two examples of WPAN technologies................................3Part 3- Critical Reflection on Energy Harvest.....................................................................4References............................................................................................................................7

2WIRELESS NETWORKSPart 1- Three Data Encryption Standards of WIMAXThe three standards of data encryption of WIMAX are:DES: Data Encryption Standard or DES is considered to be a symmetric key algorithm.The block cipher here is of 64 bits. It has the ability to encrypt exactly 64 bits of data at a singletime. Presently it is known as AES. The DES differs from stream cipher because it does notencrypt single bit at one time. This is a symmetric cryptography (ISLAM & AZAD, 2014). Acipher block called Fiestal block forms the basis of DES. The size of key in this encryptionstandard is 56 bits but the actual key input is of 8 byte. It is known to be the main standard orform of symmetric algorithm.Triple DES: Triple DES is a variation of the Data Encryption Standard. It is also knownas EDE which means to encrypt then decrypt and again encrypt. Three DES applications areused in triple DES (Barker & Barker, 2012). There are two DES keys that are independent innature. An effective key length is generated that is 168 bits long. The three keys are of size 168,112 and 56 bits. The 56 bits key is used for first encryption, and then the 112 bits key is used fordecryption. At the end the 168 bits key is used for encryption again (Bhanot & Hans, 2015). Thisis much more secured than the DES. RC2: RC2 is considered to be a symmetric key block cipher that is of 64 bits. The keysused vary in length. The block cipher is iterated and its computation is a function of plaintext.There are two types of rounds present in RC2 (Alam & Khan, 2013). RC2 is the optimizedversion of the DES. The cipher here is fast. The decryption and encryption operations are notequal. The keys are public. And it is a symmetric algorithm unlike the symmetric block cipher of

** You are reading a preview**

Upload your documents to download

or

Become a Desklib member to get accesss