a. What was the first core wireless security standard? b. What encryption algorithm does it use? c. Why are permanent shared keys undesirable? d. What per-frame key does a WEP computer or access point use to encrypt when it transmits? e. What mistake did the 802.11 Working Group make in selecting the length of the IV? f. How long may WEP take to crack today? g. Should corporations today use WEP for security?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here