Powered by Blogger.

Follow us on facebook

Tech Archive

Contact Form

Name

Email *

Message *

Wednesday, 11 June 2014

WEP Authentication Processes

11:09 - By Unknown 0

WEP uses two methods for authentication:

  • Open System authentication: In this method of authentication, users are not expected to enter their details to the Access Point (typically the router) during authentication. Any user can access the Access Point and try to use it. At that point, a WEP key would be requested to login. This type of authentication is normally used in campuses of schools and some internet cafes.
  • Shared Key authentication : Authentication occurs in a four step challenge response handshake:
    • The user sends an authentication request to the Access Point
      The Access Point replies with a clear-text challenge
      The user encrypts the challenge-text using the WEP key and sends it back in another authentication request
      The Access Point decrypts the response. The Access Point sends a positive reply if it matches the challenge text.
    It is recommended to use the Open System authentition where privacy is a major priority since it offers more privacy compared to the Shared Key authentication.  



    About the Author

    Lorem ipsum dolor sit amet, consectetur adipiscing elit. Pellentesque volutpat volutpat nibh nec posuere. Follow me @Bloggertheme9
    View all posts by admin →

    You might also like:

    Get Updates

    Subscribe to our e-mail newsletter to receive updates.

    Share This Post

    0 comments:

    Latest News

    Blogroll

    Recent news

    Blogroll

    Discussion

    © 2014 MyBlogger Pro. WP Theme-junkie converted by Bloggertheme9 Published By Gooyaabi Templates
    Powered by Blogger.