WEP uses two methods for authentication:
The user sends an authentication request to the Access Point
It is recommended to use the Open System authentition where privacy is a major priority since it offers more privacy compared to the Shared Key authentication.
The Access Point replies with a clear-text challenge
The user encrypts the challenge-text using the WEP key and sends it back in another authentication request
The Access Point decrypts the response. The Access Point sends a positive reply if it matches the challenge text.
Wednesday, 11 June 2014
WEP Authentication Processes
Tags: Networking

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Pellentesque volutpat volutpat nibh nec posuere. Follow me @Bloggertheme9
View all posts by admin →
Get Updates
Subscribe to our e-mail newsletter to receive updates.
Share This Post
Latest News
Blogroll
-
WEP Authentication Processes
-
The Difference Between WEP & WPA Encryptions
-
WEP Systems
-
WPA & WPA2 Security Protocols
-
How to share a blog post to all Facebook groups with a Click.
-
How to Embed Facebook send button into your Blog or Website
-
How to Restore a Blogger Template Easily
-
How To Enable Search Engines to Crawl your Blog
-
Free Meta Tag Analyzer Tools
-
How to install Connectify
Popular Posts
Video Widget
Recent post
Categories
Blogroll
Recent news
Text Widget
Blogroll
Discussion
Powered by Blogger.

0 comments: