Security in Wireless Communication Networks by Yi Qian & Feng Ye & Hsiao-Hwa Chen

Security in Wireless Communication Networks by Yi Qian & Feng Ye & Hsiao-Hwa Chen

Author:Yi Qian & Feng Ye & Hsiao-Hwa Chen [Qian, Yi & Ye, Feng & Chen, Hsiao-Hwa]
Language: eng
Format: epub
ISBN: 9781119244394
Published: 2022-01-18T00:00:00+00:00


where is generated based on PIN and the length of PIN . First, a 16‐byte is generated by passing through a constraining function as follows:

where outputs the smaller value between 5 and . It can be seen that if is smaller than 16 bytes, then ADDR is used. If , then . Once is generated, is computed as follows:

The other input to is , which is generated based on RAND and as follows:

The function computes final output of that is .

Figure 8.17 Overview of function .

Figure 8.18 Overview of function .



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.