ABSTRACT

Although a number of studies on data security have been published in the last

decade, many security breaches still occur because some newly introduced

security protocols exhibit the vulnerabilities arising from the already known

security problems. For example, the initial version of the IEEE 802.11 wired

equivalent privacy (WEP) protocol allowed broadcasting of access point iden-

tifiers as cleartext so that a man-in-the-middle attack with a fake identifier was

easily possible. Or, the encryption key length used in the WEP by default did

not fulfill the requirements of the current standards for strong cryptography,

that is, they used a 64-bit key instead of a 128-bit key. Therefore, it is of crucial

importance to study and understand the fundamental security principles

explained in this chapter.