Global Information Lookup Global Information

Wired Equivalent Privacy information


Wired Equivalent Privacy (WEP) is a severely flawed security algorithm for 802.11 wireless networks. Introduced as part of the original IEEE 802.11 standard ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wired network.[1] WEP, recognizable by its key of 10 or 26 hexadecimal digits (40 or 104 bits), was at one time widely used, and was often the first security choice presented to users by router configuration tools.[2][3]

Subsequent to a 2001 disclosure of a severe design flaw in the algorithm,[4] WEP was never again secure in practice. In the vast majority of cases, Wi-Fi hardware devices relying on WEP security could not be upgraded to secure operation. Some of the design flaws were addressed in WEP2, but WEP2 also proved insecure, and another generation of hardware could not be upgraded to secure operation.

In 2003, the Wi-Fi Alliance announced that WEP and WEP2 had been superseded by Wi-Fi Protected Access (WPA). In 2004, with the ratification of the full 802.11i standard (i.e. WPA2), the IEEE declared that both WEP-40 and WEP-104 have been deprecated.[5] WPA retained some design characteristics of WEP that remained problematic.

WEP was the only encryption protocol available to 802.11a and 802.11b devices built before the WPA standard, which was available for 802.11g devices. However, some 802.11b devices were later provided with firmware or software updates to enable WPA, and newer devices had it built in.[6]

  1. ^ IEEE Standard for Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. IEEE STD 802.11-1997. November 1997. pp. 1–445. doi:10.1109/IEEESTD.1997.85951. ISBN 1-55937-935-9.
  2. ^ Andrea Bittau; Mark Handley; Joshua Lackey. The Final Nail in WEP's Coffin (PDF). 2006 IEEE Symposium on Security and Privacy. doi:10.1109/SP.2006.40. Archived (PDF) from the original on 2008-10-31. Retrieved 2008-03-16.
  3. ^ "Wireless Adoption Leaps Ahead, Advanced Encryption Gains Ground in the Post-WEP Era" (Press release). RSA Security. 2007-06-14. Archived from the original on 2008-02-02. Retrieved 2007-12-28.
  4. ^ Fluhrer, Scott; Mantin, Itsik; Shamir, Adi (2001). "Weaknesses in the Key Scheduling Algorithm of RC4" (PDF).
  5. ^ "What is a WEP key?". Archived from the original on April 17, 2008. Retrieved 2008-03-11.
  6. ^ "SolutionBase: 802.11g vs. 802.11b". techrepublic.com. 19 August 2004.

and 17 Related for: Wired Equivalent Privacy information

Request time (Page generated in 0.8446 seconds.)

Wired Equivalent Privacy

Last Update:

Wired Equivalent Privacy (WEP) is a severely flawed security algorithm for 802.11 wireless networks. Introduced as part of the original IEEE 802.11 standard...

Word Count : 2879

AOSS

Last Update:

security available to both connecting devices, including both Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). Association Phase: Once...

Word Count : 540

WEP

Last Update:

Provision, a statutory provision of the U.S. Social Security system Wired Equivalent Privacy (WEP), a wireless network security standard (sometimes mistakenly...

Word Count : 202

AirPort

Last Update:

cryptography. The original graphite AirPort base station used 40-bit Wired Equivalent Privacy (WEP). The second-generation model (known as Dual Ethernet or Snow)...

Word Count : 3799

Wireless LAN

Last Update:

communication in comparison to wired LANs, the 802.11 designers also included encryption mechanisms: Wired Equivalent Privacy (WEP), no longer considered...

Word Count : 1926

Wireless security

Last Update:

network. The most common type is Wi-Fi security, which includes Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is an old IEEE 802...

Word Count : 6899

PTW

Last Update:

from Florida The Pychkine-Tews-Weinmann attack used to defeat Wired Equivalent Privacy encryption. Permit to Work This disambiguation page lists articles...

Word Count : 78

Privacy

Last Update:

"How Europe's New Privacy Law Will Change the Web, and More". Wired. ISSN 1059-1028. Retrieved 2021-10-26. "Children's Online Privacy Protection Rule ("COPPA")"...

Word Count : 13519

Cryptography standards

Last Update:

Algorithm (DSA) RSA Elliptic Curve DSA X.509 Public Key Certificates Wired Equivalent Privacy (WEP), severely flawed and superseded by WPA Wi-Fi Protected Access...

Word Count : 498

List of computing and IT abbreviations

Last Update:

Multiplexing WebDAV—WWW Distributed Authoring and Versioning WEP—Wired Equivalent Privacy WFI—Wait For Interrupt Wi-Fi—Wireless Fidelity WiMAX—Worldwide...

Word Count : 6615

Cyclic redundancy check

Last Update:

encryption key; this was one of the well-known design flaws of the Wired Equivalent Privacy (WEP) protocol. To compute an n-bit binary CRC, line the bits representing...

Word Count : 5953

Temporal Key Integrity Protocol

Last Update:

published October 31, 2002; 21 years ago (2002-10-31) Derived from Wired Equivalent Privacy Cipher detail Key sizes 128 bits Best public cryptanalysis Deprecated...

Word Count : 1588

List of information technology initialisms

Last Update:

Organization W3C WAN Wide-area network Telecom Telecom Glossary WEP Wired Equivalent Privacy Wireless IEEE 802.11 Wi-Fi An implementation of IEEE wireless communication...

Word Count : 124

Initialization vector

Last Update:

research. The 802.11 encryption algorithm called WEP (short for Wired Equivalent Privacy) used a short, 24-bit IV, leading to reused IVs with the same key...

Word Count : 1779

Radio beacon

Last Update:

carries the SSID, the channel number and security protocols such as Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA). This transmission does not...

Word Count : 1464

RSNE

Last Update:

associations (RSNAs), and that the group cipher suite specified is not wired equivalent privacy (WEP). IEEE Computer Society, LAN/MAAN Standards Committee (2016)...

Word Count : 79

Cryptanalysis

Last Update:

cryptography, and the DVD Content Scrambling System. In 2001, Wired Equivalent Privacy (WEP), a protocol used to secure Wi-Fi wireless networks, was shown...

Word Count : 5176

PDF Search Engine © AllGlobal.net