Wireless Networks
Wireless Networks
Wireless Networks
Authors:
Archana Vivekananda Polytechnic
Puttur
• Cryptographic techniques
• WEP Uses RC4 symmetric key, stream cipher
algorithm to generate a pseudo random data
sequence. The stream is XORed with the data
to be transmitted
• Unfortunately, recent attacks have shown that
the WEP approach for privacy is vulnerable to
certain attack regardless of key size
Data Integrity