Wired Equivalent Privacy, the Glossary
Wired Equivalent Privacy (WEP) is a severely flawed security algorithm for 802.11 wireless networks.[1]
Table of Contents
54 relations: Address Resolution Protocol, Adi Shamir, Agere Systems, Aircrack-ng, ASCII, Bit, Brute-force attack, Business Wire, Challenge–response authentication, Computation of cyclic redundancy checks, Computer network, Confidentiality, Cryptanalysis, Data integrity, Export of cryptography from the United States, Extensible Authentication Protocol, Federal Bureau of Investigation, Firmware, Hexadecimal, IEEE 802.11, IEEE 802.11a-1999, IEEE 802.11b-1999, IEEE 802.11g-2003, Initialization vector, IPsec, Key (cryptography), Key size, Local area network, Lucent Technologies, Mark Handley (computer scientist), Microsoft Windows, Payment Card Industry Data Security Standard, Payment Card Industry Security Standards Council, Pentium M, Plaintext, Proxim Wireless, RC4, Related-key attack, Replay attack, RSA Security, Secure Shell, Stream cipher, Stream cipher attacks, Symmetric-key algorithm, Temporal Key Integrity Protocol, TJ Maxx, Tunneling protocol, Wi-Fi Alliance, Wi-Fi deauthentication attack, Wi-Fi Protected Access, ... Expand index (4 more) »
- Broken cryptography algorithms
Address Resolution Protocol
The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.
See Wired Equivalent Privacy and Address Resolution Protocol
Adi Shamir
Adi Shamir (עדי שמיר; born July 6, 1952) is an Israeli cryptographer and inventor.
See Wired Equivalent Privacy and Adi Shamir
Agere Systems
Agere Systems, Inc. was an integrated circuit components company based in Allentown, Pennsylvania.
See Wired Equivalent Privacy and Agere Systems
Aircrack-ng
Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.
See Wired Equivalent Privacy and Aircrack-ng
ASCII
ASCII, an acronym for American Standard Code for Information Interchange, is a character encoding standard for electronic communication.
See Wired Equivalent Privacy and ASCII
Bit
The bit is the most basic unit of information in computing and digital communication.
See Wired Equivalent Privacy and Bit
Brute-force attack
In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.
See Wired Equivalent Privacy and Brute-force attack
Business Wire
Business Wire is an American company that disseminates full-text press releases from thousands of companies and organizations worldwide to news media, financial markets, disclosure systems, investors, information web sites, databases, bloggers, social networks and other audiences.
See Wired Equivalent Privacy and Business Wire
Challenge–response authentication
In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") to be authenticated.
See Wired Equivalent Privacy and Challenge–response authentication
Computation of cyclic redundancy checks
Computation of a cyclic redundancy check is derived from the mathematics of polynomial division, modulo two.
See Wired Equivalent Privacy and Computation of cyclic redundancy checks
Computer network
A computer network is a set of computers sharing resources located on or provided by network nodes.
See Wired Equivalent Privacy and Computer network
Confidentiality
Confidentiality involves a set of rules or a promise usually executed through confidentiality agreements that limits the access to or places restrictions on distribution of certain types of information.
See Wired Equivalent Privacy and Confidentiality
Cryptanalysis
Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems.
See Wired Equivalent Privacy and Cryptanalysis
Data integrity
Data integrity is the maintenance of, and the assurance of, data accuracy and consistency over its entire life-cycle.
See Wired Equivalent Privacy and Data integrity
Export of cryptography from the United States
The export of cryptography from the United States to other countries has experienced various levels of restrictions over time.
See Wired Equivalent Privacy and Export of cryptography from the United States
Extensible Authentication Protocol
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections.
See Wired Equivalent Privacy and Extensible Authentication Protocol
Federal Bureau of Investigation
The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency.
See Wired Equivalent Privacy and Federal Bureau of Investigation
Firmware
In computing, firmware is software that provides low-level control of computing device hardware.
See Wired Equivalent Privacy and Firmware
Hexadecimal
In mathematics and computing, the hexadecimal (also base-16 or simply hex) numeral system is a positional numeral system that represents numbers using a radix (base) of sixteen.
See Wired Equivalent Privacy and Hexadecimal
IEEE 802.11
IEEE 802.11 is part of the IEEE 802 set of local area network (LAN) technical standards, and specifies the set of medium access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) computer communication.
See Wired Equivalent Privacy and IEEE 802.11
IEEE 802.11a-1999
IEEE 802.11a-1999 or 802.11a was an amendment to the IEEE 802.11 wireless local network specifications that defined requirements for an orthogonal frequency-division multiplexing (OFDM) communication system. Wired Equivalent Privacy and IEEE 802.11a-1999 are IEEE 802.11.
See Wired Equivalent Privacy and IEEE 802.11a-1999
IEEE 802.11b-1999
IEEE 802.11b-1999 or 802.11b is an amendment to the IEEE 802.11 wireless networking specification that extends throughout up to 11 Mbit/s using the same 2.4 GHz band. Wired Equivalent Privacy and IEEE 802.11b-1999 are IEEE 802.11.
See Wired Equivalent Privacy and IEEE 802.11b-1999
IEEE 802.11g-2003
IEEE 802.11g-2003 or 802.11g is an amendment to the IEEE 802.11 specification that operates in the 2.4 GHz microwave band. Wired Equivalent Privacy and IEEE 802.11g-2003 are IEEE 802.11.
See Wired Equivalent Privacy and IEEE 802.11g-2003
Initialization vector
In cryptography, an initialization vector (IV) or starting variable is an input to a cryptographic primitive being used to provide the initial state.
See Wired Equivalent Privacy and Initialization vector
IPsec
In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. Wired Equivalent Privacy and IPsec are cryptographic protocols.
See Wired Equivalent Privacy and IPsec
Key (cryptography)
A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data.
See Wired Equivalent Privacy and Key (cryptography)
Key size
In cryptography, key size or key length refers to the number of bits in a key used by a cryptographic algorithm (such as a cipher).
See Wired Equivalent Privacy and Key size
Local area network
A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.
See Wired Equivalent Privacy and Local area network
Lucent Technologies
Lucent Technologies, Inc. was an American multinational telecommunications equipment company headquartered in Murray Hill, New Jersey.
See Wired Equivalent Privacy and Lucent Technologies
Mark Handley (computer scientist)
Mark James Handley is Professor of Networked Systems in the Department of Computer Science of University College London since 2003, where he leads the Networks Research Group.
See Wired Equivalent Privacy and Mark Handley (computer scientist)
Microsoft Windows
Microsoft Windows is a product line of proprietary graphical operating systems developed and marketed by Microsoft.
See Wired Equivalent Privacy and Microsoft Windows
Payment Card Industry Data Security Standard
The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard used to handle credit cards from major card brands.
See Wired Equivalent Privacy and Payment Card Industry Data Security Standard
Payment Card Industry Security Standards Council
The Payment Card Industry Security Standards Council (PCI SSC) was formed by American Express, Discover Financial Services, JCB International, MasterCard and Visa Inc. on September 7, 2006, with the goal of managing the ongoing evolution of the Payment Card Industry Data Security Standard.
See Wired Equivalent Privacy and Payment Card Industry Security Standards Council
Pentium M
The Pentium M is a family of mobile 32-bit single-core x86 microprocessors (with the modified Intel P6 microarchitecture) introduced in March 2003 and forming a part of the Intel Carmel notebook platform under the then new Centrino brand.
See Wired Equivalent Privacy and Pentium M
Plaintext
In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms.
See Wired Equivalent Privacy and Plaintext
Proxim Wireless
Proxim Wireless Corporation is a San Jose, California-based company that builds scalable broadband wireless networking systems for communities, enterprises, governments, and service providers.
See Wired Equivalent Privacy and Proxim Wireless
RC4
In cryptography, RC4 (Rivest Cipher 4, also known as ARC4 or ARCFOUR, meaning Alleged RC4, see below) is a stream cipher.
See Wired Equivalent Privacy and RC4
In cryptography, a related-key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the keys is known to the attacker.
See Wired Equivalent Privacy and Related-key attack
Replay attack
A replay attack (also known as a repeat attack or playback attack) is a form of network attack in which valid data transmission is maliciously or fraudulently repeated or delayed.
See Wired Equivalent Privacy and Replay attack
RSA Security
RSA Security LLC, formerly RSA Security, Inc. and trade name RSA, is an American computer and network security company with a focus on encryption and encryption standards.
See Wired Equivalent Privacy and RSA Security
Secure Shell
The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Wired Equivalent Privacy and secure Shell are cryptographic protocols.
See Wired Equivalent Privacy and Secure Shell
Stream cipher
A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream).
See Wired Equivalent Privacy and Stream cipher
Stream cipher attacks
Stream ciphers, where plaintext bits are combined with a cipher bit stream by an exclusive-or operation (xor), can be very secure if used properly.
See Wired Equivalent Privacy and Stream cipher attacks
Symmetric-key algorithm
Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext.
See Wired Equivalent Privacy and Symmetric-key algorithm
Temporal Key Integrity Protocol
Temporal Key Integrity Protocol (TKIP) is a security protocol used in the IEEE 802.11 wireless networking standard. Wired Equivalent Privacy and Temporal Key Integrity Protocol are Broken cryptography algorithms, cryptographic protocols and IEEE 802.11.
See Wired Equivalent Privacy and Temporal Key Integrity Protocol
TJ Maxx
TJ Maxx (stylized as T•J•maxx) is an American department store chain, selling at prices generally lower than other major similar stores.
See Wired Equivalent Privacy and TJ Maxx
Tunneling protocol
In computer networks, a tunneling protocol is a communication protocol which allows for the movement of data from one network to another.
See Wired Equivalent Privacy and Tunneling protocol
Wi-Fi Alliance
The Wi-Fi Alliance is a non-profit organization that owns the Wi-Fi trademark.
See Wired Equivalent Privacy and Wi-Fi Alliance
Wi-Fi deauthentication attack
A Wi-Fi deauthentication attack is a type of denial-of-service attack that targets communication between a user and a Wi-Fi wireless access point.
See Wired Equivalent Privacy and Wi-Fi deauthentication attack
Wi-Fi Protected Access
Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security certification programs developed after 2000 by the Wi-Fi Alliance to secure wireless computer networks. Wired Equivalent Privacy and wi-Fi Protected Access are computer network security, cryptographic protocols and IEEE 802.11.
See Wired Equivalent Privacy and Wi-Fi Protected Access
Wireless access point
In computer networking, a wireless access point, or more generally just access point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a wired network or wireless network. Wired Equivalent Privacy and wireless access point are IEEE 802.11.
See Wired Equivalent Privacy and Wireless access point
Wireless LAN
A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building.
See Wired Equivalent Privacy and Wireless LAN
Wireless security
Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. Wired Equivalent Privacy and wireless security are computer network security.
See Wired Equivalent Privacy and Wireless security
3Com
3Com Corporation was an American digital electronics manufacturer best known for its computer network products.
See Wired Equivalent Privacy and 3Com
See also
Broken cryptography algorithms
- Cayley–Purser algorithm
- Crypt (C)
- Crypt (Unix)
- Dual EC DRBG
- EMV
- GGH encryption scheme
- MS-CHAP
- Merkle–Hellman knapsack cryptosystem
- Microsoft Point-to-Point Encryption
- NIST SP 800-90A
- Point-to-Point Tunneling Protocol
- RADIUS
- Supersingular isogeny key exchange
- Temporal Key Integrity Protocol
- Wi-Fi Protected Setup
- Wired Equivalent Privacy
References
[1] https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy
Also known as WEP Key, WEP+, WEP-104, WEP-40, WEP2, WEPplus, Wireless Encryption Protocol, Wireless Equivalent Protocol.
, Wireless access point, Wireless LAN, Wireless security, 3Com.