en.unionpedia.org

Wired Equivalent Privacy, the Glossary

Index Wired Equivalent Privacy

Wired Equivalent Privacy (WEP) is a severely flawed security algorithm for 802.11 wireless networks.[1]

Table of Contents

  1. 54 relations: Address Resolution Protocol, Adi Shamir, Agere Systems, Aircrack-ng, ASCII, Bit, Brute-force attack, Business Wire, Challenge–response authentication, Computation of cyclic redundancy checks, Computer network, Confidentiality, Cryptanalysis, Data integrity, Export of cryptography from the United States, Extensible Authentication Protocol, Federal Bureau of Investigation, Firmware, Hexadecimal, IEEE 802.11, IEEE 802.11a-1999, IEEE 802.11b-1999, IEEE 802.11g-2003, Initialization vector, IPsec, Key (cryptography), Key size, Local area network, Lucent Technologies, Mark Handley (computer scientist), Microsoft Windows, Payment Card Industry Data Security Standard, Payment Card Industry Security Standards Council, Pentium M, Plaintext, Proxim Wireless, RC4, Related-key attack, Replay attack, RSA Security, Secure Shell, Stream cipher, Stream cipher attacks, Symmetric-key algorithm, Temporal Key Integrity Protocol, TJ Maxx, Tunneling protocol, Wi-Fi Alliance, Wi-Fi deauthentication attack, Wi-Fi Protected Access, ... Expand index (4 more) »

  2. Broken cryptography algorithms

Address Resolution Protocol

The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address.

See Wired Equivalent Privacy and Address Resolution Protocol

Adi Shamir

Adi Shamir (עדי שמיר; born July 6, 1952) is an Israeli cryptographer and inventor.

See Wired Equivalent Privacy and Adi Shamir

Agere Systems

Agere Systems, Inc. was an integrated circuit components company based in Allentown, Pennsylvania.

See Wired Equivalent Privacy and Agere Systems

Aircrack-ng

Aircrack-ng is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs.

See Wired Equivalent Privacy and Aircrack-ng

ASCII

ASCII, an acronym for American Standard Code for Information Interchange, is a character encoding standard for electronic communication.

See Wired Equivalent Privacy and ASCII

Bit

The bit is the most basic unit of information in computing and digital communication.

See Wired Equivalent Privacy and Bit

Brute-force attack

In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly.

See Wired Equivalent Privacy and Brute-force attack

Business Wire

Business Wire is an American company that disseminates full-text press releases from thousands of companies and organizations worldwide to news media, financial markets, disclosure systems, investors, information web sites, databases, bloggers, social networks and other audiences.

See Wired Equivalent Privacy and Business Wire

Challenge–response authentication

In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another party must provide a valid answer ("response") to be authenticated.

See Wired Equivalent Privacy and Challenge–response authentication

Computation of cyclic redundancy checks

Computation of a cyclic redundancy check is derived from the mathematics of polynomial division, modulo two.

See Wired Equivalent Privacy and Computation of cyclic redundancy checks

Computer network

A computer network is a set of computers sharing resources located on or provided by network nodes.

See Wired Equivalent Privacy and Computer network

Confidentiality

Confidentiality involves a set of rules or a promise usually executed through confidentiality agreements that limits the access to or places restrictions on distribution of certain types of information.

See Wired Equivalent Privacy and Confidentiality

Cryptanalysis

Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems.

See Wired Equivalent Privacy and Cryptanalysis

Data integrity

Data integrity is the maintenance of, and the assurance of, data accuracy and consistency over its entire life-cycle.

See Wired Equivalent Privacy and Data integrity

Export of cryptography from the United States

The export of cryptography from the United States to other countries has experienced various levels of restrictions over time.

See Wired Equivalent Privacy and Export of cryptography from the United States

Extensible Authentication Protocol

Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections.

See Wired Equivalent Privacy and Extensible Authentication Protocol

Federal Bureau of Investigation

The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency.

See Wired Equivalent Privacy and Federal Bureau of Investigation

Firmware

In computing, firmware is software that provides low-level control of computing device hardware.

See Wired Equivalent Privacy and Firmware

Hexadecimal

In mathematics and computing, the hexadecimal (also base-16 or simply hex) numeral system is a positional numeral system that represents numbers using a radix (base) of sixteen.

See Wired Equivalent Privacy and Hexadecimal

IEEE 802.11

IEEE 802.11 is part of the IEEE 802 set of local area network (LAN) technical standards, and specifies the set of medium access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) computer communication.

See Wired Equivalent Privacy and IEEE 802.11

IEEE 802.11a-1999

IEEE 802.11a-1999 or 802.11a was an amendment to the IEEE 802.11 wireless local network specifications that defined requirements for an orthogonal frequency-division multiplexing (OFDM) communication system. Wired Equivalent Privacy and IEEE 802.11a-1999 are IEEE 802.11.

See Wired Equivalent Privacy and IEEE 802.11a-1999

IEEE 802.11b-1999

IEEE 802.11b-1999 or 802.11b is an amendment to the IEEE 802.11 wireless networking specification that extends throughout up to 11 Mbit/s using the same 2.4 GHz band. Wired Equivalent Privacy and IEEE 802.11b-1999 are IEEE 802.11.

See Wired Equivalent Privacy and IEEE 802.11b-1999

IEEE 802.11g-2003

IEEE 802.11g-2003 or 802.11g is an amendment to the IEEE 802.11 specification that operates in the 2.4 GHz microwave band. Wired Equivalent Privacy and IEEE 802.11g-2003 are IEEE 802.11.

See Wired Equivalent Privacy and IEEE 802.11g-2003

Initialization vector

In cryptography, an initialization vector (IV) or starting variable is an input to a cryptographic primitive being used to provide the initial state.

See Wired Equivalent Privacy and Initialization vector

IPsec

In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. Wired Equivalent Privacy and IPsec are cryptographic protocols.

See Wired Equivalent Privacy and IPsec

Key (cryptography)

A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data.

See Wired Equivalent Privacy and Key (cryptography)

Key size

In cryptography, key size or key length refers to the number of bits in a key used by a cryptographic algorithm (such as a cipher).

See Wired Equivalent Privacy and Key size

Local area network

A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.

See Wired Equivalent Privacy and Local area network

Lucent Technologies

Lucent Technologies, Inc. was an American multinational telecommunications equipment company headquartered in Murray Hill, New Jersey.

See Wired Equivalent Privacy and Lucent Technologies

Mark Handley (computer scientist)

Mark James Handley is Professor of Networked Systems in the Department of Computer Science of University College London since 2003, where he leads the Networks Research Group.

See Wired Equivalent Privacy and Mark Handley (computer scientist)

Microsoft Windows

Microsoft Windows is a product line of proprietary graphical operating systems developed and marketed by Microsoft.

See Wired Equivalent Privacy and Microsoft Windows

Payment Card Industry Data Security Standard

The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard used to handle credit cards from major card brands.

See Wired Equivalent Privacy and Payment Card Industry Data Security Standard

Payment Card Industry Security Standards Council

The Payment Card Industry Security Standards Council (PCI SSC) was formed by American Express, Discover Financial Services, JCB International, MasterCard and Visa Inc. on September 7, 2006, with the goal of managing the ongoing evolution of the Payment Card Industry Data Security Standard.

See Wired Equivalent Privacy and Payment Card Industry Security Standards Council

Pentium M

The Pentium M is a family of mobile 32-bit single-core x86 microprocessors (with the modified Intel P6 microarchitecture) introduced in March 2003 and forming a part of the Intel Carmel notebook platform under the then new Centrino brand.

See Wired Equivalent Privacy and Pentium M

Plaintext

In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms.

See Wired Equivalent Privacy and Plaintext

Proxim Wireless

Proxim Wireless Corporation is a San Jose, California-based company that builds scalable broadband wireless networking systems for communities, enterprises, governments, and service providers.

See Wired Equivalent Privacy and Proxim Wireless

RC4

In cryptography, RC4 (Rivest Cipher 4, also known as ARC4 or ARCFOUR, meaning Alleged RC4, see below) is a stream cipher.

See Wired Equivalent Privacy and RC4

In cryptography, a related-key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys whose values are initially unknown, but where some mathematical relationship connecting the keys is known to the attacker.

See Wired Equivalent Privacy and Related-key attack

Replay attack

A replay attack (also known as a repeat attack or playback attack) is a form of network attack in which valid data transmission is maliciously or fraudulently repeated or delayed.

See Wired Equivalent Privacy and Replay attack

RSA Security

RSA Security LLC, formerly RSA Security, Inc. and trade name RSA, is an American computer and network security company with a focus on encryption and encryption standards.

See Wired Equivalent Privacy and RSA Security

Secure Shell

The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Wired Equivalent Privacy and secure Shell are cryptographic protocols.

See Wired Equivalent Privacy and Secure Shell

Stream cipher

A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream).

See Wired Equivalent Privacy and Stream cipher

Stream cipher attacks

Stream ciphers, where plaintext bits are combined with a cipher bit stream by an exclusive-or operation (xor), can be very secure if used properly.

See Wired Equivalent Privacy and Stream cipher attacks

Symmetric-key algorithm

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext.

See Wired Equivalent Privacy and Symmetric-key algorithm

Temporal Key Integrity Protocol

Temporal Key Integrity Protocol (TKIP) is a security protocol used in the IEEE 802.11 wireless networking standard. Wired Equivalent Privacy and Temporal Key Integrity Protocol are Broken cryptography algorithms, cryptographic protocols and IEEE 802.11.

See Wired Equivalent Privacy and Temporal Key Integrity Protocol

TJ Maxx

TJ Maxx (stylized as T•J•maxx) is an American department store chain, selling at prices generally lower than other major similar stores.

See Wired Equivalent Privacy and TJ Maxx

Tunneling protocol

In computer networks, a tunneling protocol is a communication protocol which allows for the movement of data from one network to another.

See Wired Equivalent Privacy and Tunneling protocol

Wi-Fi Alliance

The Wi-Fi Alliance is a non-profit organization that owns the Wi-Fi trademark.

See Wired Equivalent Privacy and Wi-Fi Alliance

Wi-Fi deauthentication attack

A Wi-Fi deauthentication attack is a type of denial-of-service attack that targets communication between a user and a Wi-Fi wireless access point.

See Wired Equivalent Privacy and Wi-Fi deauthentication attack

Wi-Fi Protected Access

Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security certification programs developed after 2000 by the Wi-Fi Alliance to secure wireless computer networks. Wired Equivalent Privacy and wi-Fi Protected Access are computer network security, cryptographic protocols and IEEE 802.11.

See Wired Equivalent Privacy and Wi-Fi Protected Access

Wireless access point

In computer networking, a wireless access point, or more generally just access point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a wired network or wireless network. Wired Equivalent Privacy and wireless access point are IEEE 802.11.

See Wired Equivalent Privacy and Wireless access point

Wireless LAN

A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building.

See Wired Equivalent Privacy and Wireless LAN

Wireless security

Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. Wired Equivalent Privacy and wireless security are computer network security.

See Wired Equivalent Privacy and Wireless security

3Com

3Com Corporation was an American digital electronics manufacturer best known for its computer network products.

See Wired Equivalent Privacy and 3Com

See also

Broken cryptography algorithms

References

[1] https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy

Also known as WEP Key, WEP+, WEP-104, WEP-40, WEP2, WEPplus, Wireless Encryption Protocol, Wireless Equivalent Protocol.

, Wireless access point, Wireless LAN, Wireless security, 3Com.