18.07.2013 Views

A comparison of wi-fi and wimax with case studies - Florida State ...

A comparison of wi-fi and wimax with case studies - Florida State ...

A comparison of wi-fi and wimax with case studies - Florida State ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 3-20 WEP Frame <strong>and</strong> Operation<br />

Figure 3-21 The WEP Encryption Process<br />

However there is no perfect encryption in the world. There are some problems that exist in<br />

WEP; key management, reusing the keystream, <strong>and</strong> IV. WEP has been thought <strong>of</strong> as a very<br />

secure way to protect <strong>wi</strong>reless communication. However, a study from University <strong>of</strong> California,<br />

Berkeley called ISAAC (Internet Security Applications, Authentication <strong>and</strong> Cryptography)<br />

showed the defects <strong>of</strong> WEP design [56]. Also a method for breaking WEP has already been<br />

published [57].<br />

33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!