Which of the following BEST describes the weakness in WEP encryption?

A. The initialization vector of WEP uses a crack-able RC4 encryption algorithm. Once enough packets are captured an XOR operation can be performed and the asymmetric keys can be derived.
B. The WEP key is stored in plain text and split in portions across 224 packets of random data. Once enough packets are sniffed the IV portion of the packets can be removed leaving the plain text key.
C. The WEP key has a weak MD4 hashing algorithm used. A simple rainbow table can be used to generate key possibilities due to MD4 collisions.
D. The WEP key is stored with a very small pool of random numbers to make the cipher text. As the random numbers are often reused it becomes easy to derive the remaining WEP key.


Answer: D. The WEP key is stored with a very small pool of random numbers to make the cipher text. As the random numbers are often reused it becomes easy to derive the remaining WEP key.

Computer Science & Information Technology

You might also like to view...

When there is wasted space internal to a partition due to the fact that the block of data loaded is smaller than the partition is referred to as __________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Critical Thinking QuestionsCase F-1Cadence is the web master for the XYZ Corporation. She knows that links are the real strength of a website. She has created a navigation bar using a group of text links that helps viewers navigate between pages of the company's site. She has started working on the site's link structure and is adding an image map as well as button images. Cadence includes both internal and external links on the company's website. Both types of links have two important parts that work together. The first part of a link is what the viewer actually sees and clicks, such as ____.

A. a button B. an image C. a word D. all of the above

Computer Science & Information Technology

Which of the following is a multi-alphabet cipher?

a. Caesar cipher b. ROT13 c. Atbash cipher d. Vigenere

Computer Science & Information Technology

A web-based application encounters all of the connectivity and compatibility problems that typically arise when different hardware environments are involved.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology