Page 220 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 220
Wireless Networks
Notes 13.7 Protective Actions
The various protective actions are as ollows:
13.7.1 Wired Equivalent Privacy (WEP)
Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks.
Introduced as part of the original 802.11 standard ratified in September 1999, its intention was to
provide data confidentiality comparable to that of a traditional wired network. WEP, recognizable
by the key of 10 or 26 hexadecimal digits, is widely in use and is often the first security choice
presented to users by router configuration tools.
Although its name implies that it is as secure as a wired connection, WEP has been demonstrated
to have numerous flaws and has been deprecated in favour of newer standards such as WPA2.
In 2003 the Wi-Fi Alliance announced that WEP had been superseded by Wi-Fi Protected
Access (WPA). In 2004, with the ratification of the full 802.11i standard (i.e. WPA2), the IEEE
declared that both WEP-40 and WEP-104 "have been deprecated as they fail to meet their security
goals
WEP was included as the privacy component of the original IEEE 802.11 standard ratified in
September 1999.[citation needed]WEP uses the stream cipher RC4 for confidentiality, and
the CRC-32 checksum for integrity. It was deprecated in 2004 and is documented in the current
standard.
Standard 64-bit WEP uses a 40 bit key (also known as WEP-40), which is concatenated with a 24-
bit initialization vector (IV) to form the RC4 key. At the time that the original WEP standard was
drafted, the U.S. Government's export restrictions on cryptographic technology limited the key
size. Once the restrictions were lifted, manufacturers of access points implemented an extended
128-bit WEP protocol using a 104-bit key size (WEP-104).
A 64-bit WEP key is usually entered as a string of 10 hexadecimal(base 16) characters (0-9 and
A-F). Each character represents four bits, 10 digits of four bits each gives 40 bits; adding the 24-bit
IV produces the complete 64-bit WEP key. Most devices also allow the user to enter the key as
five ASCII characters, each of which is turned into eight bits using the character's byte value in
ASCII; however, this restricts each byte to be a printable ASCII character, which is only a small
fraction of possible byte values, greatly reducing the space of possible keys.
A 128-bit WEP key is usually entered as a string of 26 hexadecimal characters. Twenty-six digits
of four bits each gives 104 bits; adding the 24-bit IV produces the complete 128-bit WEP key. Most
devices also allow the user to enter it as 13 ASCII characters.
A 256-bit WEP system is available from some vendors. As with the other WEP-variants 24 bits of
that is for the IV, leaving 232 bits for actual protection. These 232 bits are typically entered as 58
hexadecimal characters. ((58 × 4 bits =) 232 bits) + 24 IV bits = 256-bit WEP key.
13.7.2 Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols
and security certification programs developed by the Wi-Fi Alliance to secure wireless computer
networks. The Alliance defined these in response to serious weaknesses researchers had found in
the previous system, WEP (Wired Equivalent Privacy).
WPA (sometimes referred to as the draft IEEE 802.11i standard) became available in 2003. The
Wi-Fi Alliance intended it as an intermediate measure in anticipation of the availability of the
more secure and complex WPA2. WPA2 became available in 2004 and is a common shorthand
for the full IEEE 802.11i (or IEEE 802.11i-2004) standard.
214 LOVELY PROFESSIONAL UNIVERSITY