WEP Protocol Weaknesses and Vulnerabilities. Riad Lemhachheche Jumnit Hong. OUTLINE. Introduction to WEP Problems with WEP Solutions to WEP 802.1x 802.11i WPA Conclusion. Introduction to WEP. Basically a pseudo random number generator that encrypts data packets.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
IEEE 802.1X is a standard from the IEEE for port-based network access control. The 802.1X authentication process for 802.1X applied to WLAN works as follows:
Wi-Fi Protect Access (WPA) has for goal to be an update to WEP weaknesses. It is designed to be:
To fulfill these goals, 2 major enhancements have been made:
WPA and IEEE 802.11i Comparison
The main pieces of the 802.11i draft that are not included in WPA are :
The WEP protocol described in 802.11 is not sufficient at creating cryptographically secure communication between a wireless client and an access point. It will only stop the casual attacker, with virtually no security to protect a network from the professional hacker.
The problems with WEP are as follows: