FUNDAMENTALS OF COMPUTER

TELECOMMUNICATIONS SYSTEMS

COMMUNICATION WIRELESS COMPUTING DEVICES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A WEP key that is 128 bits in length ____
A
has an initialization vector (IV) that is the same length as a WEP key of 64 bits
B
cannot be cracked because it is too long
C
cannot be used on access points that use passphrases
D
is less secure than a WEP key of 64 bits because shorter keys are stronger
Explanation: 

Detailed explanation-1: -Wired Equivalent Privacy (WEP) WEP uses a shared-secret key, which is 40 bits in length. The shared-secret key is concatenated with a 24-bit initialization vector (IV) to create a 64-bit key, which is used to encrypt packets according to the RCA RC4 PRNG algorithm.

Detailed explanation-2: -The 64-bit WEP key uses a string of 10 hexadecimal (base 16) alphanumeric characters with each character representing 4 bits, while the 128-bit WEP key uses a string of 26 hexadecimal alphanumeric characters. These characters are either numbers between 0 and 9 or letters between A and F.

Detailed explanation-3: -WEP encrypts traffic using a 64-or 128-bit key in hexadecimal. This is a static key, which means all traffic, regardless of device, is encrypted using a single key.

Detailed explanation-4: -Wired Equivalent Privacy (WEP) is a data encryption protocol for 802.11 wireless networks. All wireless stations and access points on the network are configured with a static 64-bit (40-bit secret key + 24-bit initialization vector (IV)) or 128-bit (104-bit secret key + 24-bit IV) Shared Key for data encryption.

There is 1 question to complete.