User's Manual

Table Of Contents
SEL-3022 Transceiver Instruction Manual Date Code 20050615
Wireless Operator Interface Security
IEEE 802.11 WEP Security
C.8
Cryptographic Manual—Do Not Copy
would have to capture encrypted packets for an extremely long time to analyze the few
million packets necessary to determine the WEP key and defeat the WEP encryption
function. If an attacker successfully determines the WEP encryption key, the contents
of all network packets transmitted between a maintenance PC and an SEL-3022 device
would still be protected by the cryptographically strong encryption and authentication
the SEL-3022 AES and HMAC SHA-1 functions provide (see The SEL Security
Application section below for further explanation). The cryptographic community has
scrutinized the AES encryption and HMAC SHA-1 authentication functions carefully,
but cryptographers have been unable to find any security flaws similar to those
contained in the WEP encryption function.
Preliminary Copy