Drawbacks of WEP Encryption Algorithmįollowing are the drawbacks of WEP encryption: If both new ICV and decoded matches received message is considered to be correct otherwise.The algorithm is verified for correctness by comparing new ICV with the one decoded from received data.New ICV is determined based on received plaintext.RC4 algorithm is applied to cipher text with key sequence to produce original.It is used to decrypt the incoming message. IV value from incoming message is used to generate key sequence.This is done to prevent data modification by unauthorized person.įigure:2 WEP Decryption Process Block Diagramįollowing are the steps involved in WEP decryption process: RC4 algorithm is applied on plain text, ICV and key sequence in order to generate cipher text.
The 4 bytes IV value is added with ciphertext before transmission.The resulting encrypted bytes have same length as input data bytes. The PN key sequence is XORed with data.As shown RC4 uses key value as initial seed and generates PN key sequence.Here 64 total bits consists of 40 bit secret key and 24 bit
Encrypt the plaintext using 64 bit key.One process encrypts the plaintext while the other protects the data from any modification by intruders.įollowing are the steps involved in WEP encryption process: There are two processes being applied to plaintext in WEP. The fig-1 depicts WEP encryption procedure. The WEP encryption and WEP decryption process uses simple XOR as explained below.įigure:1 WEP Encryption Process Block Diagram.
Wireless security has been a concern since long due to open air transmission medium used by it. It provides link to AES encryption used in WPA2 algorithm. It describes WEP encryption and WEP decryption block diagram, mentions WEP drawbacks and 802.1x authentication used in WPA. This page compares WEP vs WPA vs WPA2 and mentions difference between WEP, WPA and WPA2. WEP vs WPA vs WPA2 | Difference between WEP,WPA,WPA2