TELECOMMUNICATIONS SYSTEMS
COMMUNICATION WIRELESS COMPUTING DEVICES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
has an initialization vector (IV) that is the same length as a WEP key of 64 bits
|
|
cannot be cracked because it is too long
|
|
cannot be used on access points that use passphrases
|
|
is less secure than a WEP key of 64 bits because shorter keys are stronger
|
Detailed explanation-1: -Wired Equivalent Privacy (WEP) WEP uses a shared-secret key, which is 40 bits in length. The shared-secret key is concatenated with a 24-bit initialization vector (IV) to create a 64-bit key, which is used to encrypt packets according to the RCA RC4 PRNG algorithm.
Detailed explanation-2: -The 64-bit WEP key uses a string of 10 hexadecimal (base 16) alphanumeric characters with each character representing 4 bits, while the 128-bit WEP key uses a string of 26 hexadecimal alphanumeric characters. These characters are either numbers between 0 and 9 or letters between A and F.
Detailed explanation-3: -WEP encrypts traffic using a 64-or 128-bit key in hexadecimal. This is a static key, which means all traffic, regardless of device, is encrypted using a single key.
Detailed explanation-4: -Wired Equivalent Privacy (WEP) is a data encryption protocol for 802.11 wireless networks. All wireless stations and access points on the network are configured with a static 64-bit (40-bit secret key + 24-bit initialization vector (IV)) or 128-bit (104-bit secret key + 24-bit IV) Shared Key for data encryption.