logo

Security Challenges of Two Examples of WPAN Technologies

10 Pages2284 Words172 Views
   

Added on  2020-02-18

Security Challenges of Two Examples of WPAN Technologies

   Added on 2020-02-18

ShareRelated Documents
Running head: WIRELESS NETWORKSWireless NetworksName of the StudentName of the UniversityAuthor’s name
Security Challenges of Two Examples of WPAN Technologies_1
1WIRELESS NETWORKSTable of ContentsPart 1- Three Data Encryption Standards of WIMAX........................................................2Part 2- Security Challenges of two examples of WPAN technologies................................3Part 3- Critical Reflection on Energy Harvest.....................................................................4References............................................................................................................................7
Security Challenges of Two Examples of WPAN Technologies_2
2WIRELESS NETWORKSPart 1- Three Data Encryption Standards of WIMAXThe three standards of data encryption of WIMAX are:DES: Data Encryption Standard or DES is considered to be a symmetric key algorithm.The block cipher here is of 64 bits. It has the ability to encrypt exactly 64 bits of data at a singletime. Presently it is known as AES. The DES differs from stream cipher because it does notencrypt single bit at one time. This is a symmetric cryptography (ISLAM & AZAD, 2014). Acipher block called Fiestal block forms the basis of DES. The size of key in this encryptionstandard is 56 bits but the actual key input is of 8 byte. It is known to be the main standard orform of symmetric algorithm.Triple DES: Triple DES is a variation of the Data Encryption Standard. It is also knownas EDE which means to encrypt then decrypt and again encrypt. Three DES applications areused in triple DES (Barker & Barker, 2012). There are two DES keys that are independent innature. An effective key length is generated that is 168 bits long. The three keys are of size 168,112 and 56 bits. The 56 bits key is used for first encryption, and then the 112 bits key is used fordecryption. At the end the 168 bits key is used for encryption again (Bhanot & Hans, 2015). Thisis much more secured than the DES. RC2: RC2 is considered to be a symmetric key block cipher that is of 64 bits. The keysused vary in length. The block cipher is iterated and its computation is a function of plaintext.There are two types of rounds present in RC2 (Alam & Khan, 2013). RC2 is the optimizedversion of the DES. The cipher here is fast. The decryption and encryption operations are notequal. The keys are public. And it is a symmetric algorithm unlike the symmetric block cipher of
Security Challenges of Two Examples of WPAN Technologies_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Data Encryption Standards for WIMAX
|19
|1868
|69

Security Challenges of WPAN Technologies
|7
|1282
|84

Three Data Encryption Standards for WIMAX Networks Part 1: Wireless Networks
|14
|1565
|42

Wireless Sensor Networks (WSN) Assignment
|10
|1524
|35

Assignment Wireless Networking (WSNs)
|9
|1464
|252

Assignment based on Wireless Networking Concept
|9
|1501
|85