

Eavesdroppers might be able to gain information by monitoring and noting which parties communicate at particular times. WEP is not the secure alternative you’re looking for.Ī possible threat against confidentiality is network traffic analysis.

Ideally, larger key sizes translate to stronger protection, but the cryptographic technique used by WEP has known flaws that are not mitigated by longer keys. WEP also uses a 24-bit value known as an initialization vector (IV) as a seed value for initializing the cryptographic keystream. The standard for WEP specifies support for a 40-bit WEP key only however, many vendors offer nonstandard extensions to WEP that support key lengths of up to 128 or even 256 bits. The WEP protocol attempts some form of confidentiality by using the RC4 stream cipher algorithm to encrypt wireless communications. Information Security Essentials for IT ManagersĪlbert Caballero, in Managing Information Security (Second Edition), 2014 Confidentiality
