What is cable equivalent to privacy?

Cable equivalent privacy (WEP) is a form of wireless security protection originally implemented in early wireless standards, especially those used by 802.11 standards. This form of protection essentially uses an encryption key to protect data sent to az wireless network, which prevents unauthorized users from accessing the network. However, the method used in WEP encryption is not ideal and has turned out to be too open to hacker attacks, allowing them to falsify verification. Cable equivalent privacy has largely been replaced by Wi-Fi protected access protocols (WPA), which are safer and can better protect the wireless network. Wireless networks are inherently more open attack than cable networks, as cable networks are easily controlled by physical limitation of the number of systems for them. With the proliferation of wireless technologies via 802.11 standards, new protocols had to be developed to easily and effectively protect wireless systems. By the primary method of protection at the beginningKU 802.11 wireless devices was the implementation of cable equivalent privacy.

WEP basically works by generating a key that must have any computer system that connects to the network. This key is protected by encryption, but it is also used by any data that travel from the wireless system. Individual data packets sent by a router or other system connected to a wireless network protected by cable equivalent privacy include the encrypted form of the key that provides this network. This encrypted version of the key basically consists of the key itself, as well as other generated and transmitted data to help keep the key safe.

The main error in the wicked equivalent privacy is that this secondary data is too limited, so repeated formulas become inevitable for any system. Hacker can capture packets sent by the system and even cause sendingother packets to seek these repeated patterns. Once these are found, it is quite simple for the program to quickly and precisely decrypt the key and get the authentication code needed to access the wireless system. Newer wireless systems, including later versions of the 802.11 standards, use WPA and similar methods to protect these networks that allow more diverse keys that cannot be decrypted almost as easily as cable equivalent privacy.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?