Wired Equivalent Privacy

Wired Equivalent Privacy (WEP) was first released as a portion of the IEEE 802.11 standard in 1999. Its security was deemed to be the equivalent of any wired medium, hence its name. As the years passed, WEP was deemed broken, and it has since been replaced by two other iterations of wireless security protocols, Wi-Fi Protected Access (WPA) and WPA2.

Wired Equivalent Privacy is sometimes erroneously referred to as Wired Equivalent Protocol (WEP).

WEP employs the Ron’s code stream cipher (RC4), which uses 40- or 104-bit keys and a 24-bit initialization vector. WEP uses a symmetric algorithm, which means that two devices must share a secret key in order to communicate securely with one another. The problem with WEP involves the use of the 24-bit initialization vector, which will sometimes repeat itself during transmission. In the world of cryptography, randomization and non-repudiation of the initialization vector is paramount as this prevents the guessing of certain text within a transmission. If a hacker begins to see that certain encrypted text is repeating itself, he can then begin to assume that the repeated text is the same word, and decipher the message without any knowledge of the shared secret key.

Post a Comment

0 Comments