NETWORK SECURITY
INTRODUCTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
An enhanced encryption protocol combining a 104-bit key and a 24-bit initialization vector
|
WEP 128
|
|
WEP 64
|
|
WPA
|
|
None of the above
|
Explanation:
Detailed explanation-1: -WEP required the use of a 24-bit Initialization Vector (IV) along with either a 40-bit or a 104-bit secret key that was set by the administrator.
Detailed explanation-2: -The 64-bit WEP key uses a string of 10 hexadecimal (base 16) alphanumeric characters with each character representing 4 bits, while the 128-bit WEP key uses a string of 26 hexadecimal alphanumeric characters. These characters are either numbers between 0 and 9 or letters between A and F.
Detailed explanation-3: -The basic problem with WEP is that it uses a cipher not suitable for the environment it operates in. WEP uses a stream-cipher known as RC4 in synchronous mode for encrypting data packets.
There is 1 question to complete.