WEP
Wired Equivalent Privacy

The IEEE 802.11b WLAN (Wireless Local Area Network) standard incorporates a confidentiality and integrity provision called WEP. To protect the data, WEP uses the stream cipher RC4 from RSA Security Inc. There are two levels of WEP commonly available; one based on a 40bit encryption key and 24bit initialization vector (64bit encryption) and one based on a 104bit encryption key and 24bit initialization vector (128bit encryption). Prior to encryption, the data is run through an integrity check process to ensure that the recipient of the data can detect whether it has been tampered with during transmission. The RC4 algorithm then generates a key stream from either the 64bit or 128bit encryption key which is applied to the user data and integrity check. In August 2001, Scott Fluhrer, Itsik Mantin, Adi Shamir published a paper entitled Weakness in the Key Scheduling Algorithm of RC4; which outlined a theoretical method for breaking the WEP key. Providing enough traffic has been captured, modern day cracking software can crack WEP in seconds.

If you enjoy using our glossary, here are some other useful resources you might like...

Get your weekly dose of telecoms terminology delivered straight to your inbox!

We promise, no spam - just clear-cut telecoms terms to keep you on top of your game.

Our YouTube channel offers over a hundred free videos (and counting!) covering a range of technology topics.

Subscribe to our channel to be the first to know when we release new videos:

FREE Intro to 5G Sample Course

Use this no-obligation free trial to get a taste of what it's like to be an Mpirical student.

Included with the trial is an all-access pass to the LearningZone, which contains learning tools and other useful resources to help you make the most of your training.