Schweitzer Engineering Laboratories SEL-3022 Instruction Manual page 90

Wireless encrypting transceiver
Table of Contents

Advertisement

C.8
Wireless Operator Interface Security
IEEE 802.11 WEP Security
would have to capture encrypted packets for an extremely long time to analyze the few
million packets necessary to determine the WEP key and defeat the WEP encryption
function. If an attacker successfully determines the WEP encryption key, the contents
of all network packets transmitted between a maintenance PC and an SEL-3022 device
would still be protected by the cryptographically strong encryption and authentication
the SEL-3022 AES and HMAC SHA-1 functions provide (see The SEL Security
Application section below for further explanation). The cryptographic community has
scrutinized the AES encryption and HMAC SHA-1 authentication functions carefully,
but cryptographers have been unable to find any security flaws similar to those
contained in the WEP encryption function.
SEL-3022 Transceiver
Cryptographic Manual—Do Not Copy
Preliminary Copy
Instruction Manual
Date Code 20050615

Advertisement

Table of Contents
loading

Table of Contents