A comparison of wi-fi and wimax with case studies - Florida State ...
A comparison of wi-fi and wimax with case studies - Florida State ...
A comparison of wi-fi and wimax with case studies - Florida State ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Figure 3-20 WEP Frame <strong>and</strong> Operation<br />
Figure 3-21 The WEP Encryption Process<br />
However there is no perfect encryption in the world. There are some problems that exist in<br />
WEP; key management, reusing the keystream, <strong>and</strong> IV. WEP has been thought <strong>of</strong> as a very<br />
secure way to protect <strong>wi</strong>reless communication. However, a study from University <strong>of</strong> California,<br />
Berkeley called ISAAC (Internet Security Applications, Authentication <strong>and</strong> Cryptography)<br />
showed the defects <strong>of</strong> WEP design [56]. Also a method for breaking WEP has already been<br />
published [57].<br />
33