Describe the five steps in the process of WEP encryption.
What will be an ideal response?
1. The information to be encrypted has a cyclic redundancy check value calculated. This CRC generates a checksum based on the contents of the text. WEP (wired equivalent privacy) calls this the integrity check value (ICV) and appends it to of the text.
2. The WEP shared secret key used for encryption is combined initialization vector (IV).The IV is a 24-bit value that changes each time a packet is encrypted. This random IV value helps ensure that another number (created in the next step) can be created. If only the default key was used to create a random number then the number generated could be the same each time. Varying the IV each time ensures that the random number is indeed random. In this sense the IV (along with the default key) is used as a "seed" for generating a random number.
3. The shared secret key and IV are then entered into a pseudo-random generator (PRNG) that creates a random number. This output is known keystream. The keystream is essentially a series of 1's and 0's equal in the text plus the ICV.
4. The two values (text plus ICV and the keystream) are then combined the exclusive OR (XOR) operation to create the ciphertext.
5. The IV is added to the front ("pre-pended") of the ciphertext and the ready for transmission. The IV is in plaintext and is not encrypted.
You might also like to view...
The Hue slider is the set of triangles pointing to the rainbow bar in the dialog box, and dragging one triangle moves both of them.
Answer the following statement true (T) or false (F)
An automatic counter is usually a good primary key choice for a primary table because it guarantees that each record will be given a unique number
Indicate whether the statement is true or false
Using Conditional Formatting to highlight ________ is useful to see where you are missing data
Fill in the blank(s) with correct word
The height of a sound wave is called its:
a. frequency b. phase c. amplitude d. bandwidth e. furlong