The Initialization Vector (IV) is often not generated using a sufficiently random algorithm.Ī company is reviewing the options for installing a new wireless network. Packets use a checksum to verify integrity that is too difficult to compute.ĭ.) WEP only allows the use of a 64-bit key, which is not secure enough for the company. The Initialization Vector (IV) is not sufficiently large, thus is not always generated using a sufficiently random algorithm.Ĭ.) WEP has the option to use either a 64-bit or a 128-bit key, which is not secure enough for the company. The Initialization Vector (IV) is too large to provide adequate security.ī.) WEP allows for a 256-bit key but is still not secure. Analyze the features of WEP to determine what problems to highlight in the recommendation.Ī.) WEP only allows the use of a 128-bit encryption key and is not secure. The team has developed a recommendation to utilize a different encryption scheme based on the problems with WEP. A team is building a wireless network, and the company has requested the team to use a Wired Equivalent Privacy (WEP) encryption scheme.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
May 2023
Categories |