COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
An enhanced encryption protocol combining a 104-bit key and a 24-bit initialization vector
A
WEP 128
B
WEP 64
C
WPA
D
None of the above
Explanation: 

Detailed explanation-1: -WEP required the use of a 24-bit Initialization Vector (IV) along with either a 40-bit or a 104-bit secret key that was set by the administrator.

Detailed explanation-2: -The 64-bit WEP key uses a string of 10 hexadecimal (base 16) alphanumeric characters with each character representing 4 bits, while the 128-bit WEP key uses a string of 26 hexadecimal alphanumeric characters. These characters are either numbers between 0 and 9 or letters between A and F.

Detailed explanation-3: -The basic problem with WEP is that it uses a cipher not suitable for the environment it operates in. WEP uses a stream-cipher known as RC4 in synchronous mode for encrypting data packets.

There is 1 question to complete.