written 7.9 years ago by | • modified 7.9 years ago |
Mumbai University > Information Technology > Sem 7 > Wireless Technology
Marks: 10M
Year: May 2016
written 7.9 years ago by | • modified 7.9 years ago |
Mumbai University > Information Technology > Sem 7 > Wireless Technology
Marks: 10M
Year: May 2016
written 7.9 years ago by |
WEP (wired equivalent privacy)
With WEP enabled, all the data is encrypted using the Ron Rivest Code 4 (RC4) in the purpose to provide secure communication. In addition, WEP protects the wireless traffic with a randomly generated 24-bit Initialization Vector (IV), which is combined with the 40-bit or 104-bit shared secret key (so-called 128 bit in most product implementation). The WEP encryption operation is described below:
Frame body and ICV are encrypted.
Receiver checks ICV value that it has computes against what has actually arrived.
If same genuine data else discarded.