WEP (Wired Equivalent Privacy) Internet security related protocol work
how the protocol work
Companies use WEP to
protect their wireless networks from sniffer attacks.
WEP encrypts the packets
of data sent out from the access point or wireless network card using the RC4
algorithm. The packets delivered by the user's network card are decrypted as
soon as they arrive at the access point. A distinct packet key will be used to
encrypt each byte of data. This assures that if a hacker succeeds in cracking
this packet key, just the information contained in that packet is exposed.In
RC4, the encryption logic is relatively basic.
The plain text is XORed
with a keystream that is endlessly long. The secrecy of the packet key produced
from the keystream is what gives RC4 its security.

0 Comments