Email security features Show
Wireless Security Features
Network device security features Hub Transmission media:Issues
Personal Access control: Devices
Security control at device level: access control
What is the size of the secret key used in WEP encryption?WEP uses a shared-secret key, which is 40 bits in length. The shared-secret key is concatenated with a 24-bit initialization vector (IV) to create a 64-bit key, which is used to encrypt packets according to the RCA RC4 PRNG algorithm. The IV is a pseudo-random number, sent in the clear in the packet header.
What is the size of the initialization vector IV that WEP uses for encryption?An Initialization vector (IV) of length 24 bits was added to these key lengths to make the WEP keys as 64 bit/ 128 bit keys.
How does TKIP improve security?TKIP uses RC4 to perform the encryption, which is the same as WEP. A major difference from WEP, however, is that TKIP changes temporal keys every 10,000 packets. This provides a dynamic distribution method that significantly enhances the security of the network."
In which of the following attacks does an attacker crack the WEP secret key?As an example, the initialization vector (IV) that WEP uses for encryption is 24-bit, which is quite weak and means that IVs are reused with the same key. By examining the repeating result, it was easy for attackers to crack the WEP secret key. This is known as an IV attack.
|