There are two processes being applied to plaintext in WEP. The fig-1 depicts WEP encryption procedure. The WEP encryption and WEP decryption process uses simple XOR as explained below.įigure:1 WEP Encryption Process Block Diagram.
#Wep vs wpa 2 32 bit#
It uses RC4 stream cipher to provide confidentiality and CRC polynomial of 32 bit size for data integrity.It uses 40 bit key for encryption (non-standard versions can use 128 bit or 256 bit) and 24 bit pattern for IV (Initialization Vector).WEP is symmetric as same keys are used for encryption and decryption.WEP, WPA and WPA2 are encryption algorithms used in WLAN wirelessįollowing are the features of WEP (Wired Equivalent Privacy): Such as zigbee, GSM, WLAN, Zwave, bluetooth etc. There are various wireless networks based on different standard based technologies
Inspite of many security mechanisms incorporated in wireless, it can never be 100% secure mode ofĭata transmission. Wireless security has been a concern since long due to open air transmission medium used by it. It provides link to AES encryption used in WPA2 algorithm. It describes WEP encryption and WEP decryption block diagram, mentions WEP drawbacks and 802.1x authentication used in WPA. This page compares WEP vs WPA vs WPA2 and mentions difference between WEP, WPA and WPA2. WEP vs WPA vs WPA2 | Difference between WEP,WPA,WPA2