WEP protocol work

 WEP (Wired Equivalent Privacy)  Internet security related protocol work

how the protocol work

Companies use WEP to protect their wireless networks from sniffer attacks.

WEP encrypts the packets of data sent out from the access point or wireless network card using the RC4 algorithm. The packets delivered by the user's network card are decrypted as soon as they arrive at the access point. A distinct packet key will be used to encrypt each byte of data. This assures that if a hacker succeeds in cracking this packet key, just the information contained in that packet is exposed.In RC4, the encryption logic is relatively basic.

The plain text is XORed with a keystream that is endlessly long. The secrecy of the packet key produced from the keystream is what gives RC4 its security.




Post a Comment

0 Comments

Close Menu