Wired Equivalent Privacy (WEP)

  • Definition: WEP is a security protocol designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN.

  • Key Features:

    • Encryption: WEP uses the RC4 stream cipher for encrypting data.
    • Static Keys: WEP relies on a shared secret key that is typically 40 bits or 104 bits long, which is used for both encryption and decryption.
    • Initialization Vector (IV): A 24-bit IV is combined with the shared secret key to produce a unique key stream for encryption.
  • Operation:

    • Data is encrypted by performing an XOR operation between the plaintext data and the generated key stream from the combination of the shared secret key and the IV.
    • Each packet contains the IV, which is sent in clear text along with the encrypted data.
  • Advantages:

    • Provides a basic level of security for wireless networks.
    • Relatively simple to implement and configure.
  • Drawbacks:

    • Weak Security: The static key can be easily intercepted, and the short key length (especially the 40-bit version) makes it vulnerable to brute-force attacks.
    • IV Reuse: Since the IV is short (24 bits), it can be reused frequently, leading to vulnerabilities and key recovery attacks.
    • No Mutual Authentication: WEP does not provide a mechanism for mutual authentication between the client and the access point.
  • Legacy Status:

    • Due to its numerous vulnerabilities, WEP is considered obsolete and has been largely replaced by more secure protocols like Wi-Fi Protected Access (WPA) and WPA2.
    • Modern wireless networks are advised to use WPA2 or WPA3 to ensure robust security.
  • Historical Context:

    • Developed in the late 1990s as part of the IEEE 802.11 standard for wireless networks.
    • It was the first security protocol for WLANs, but its weaknesses were discovered soon after its implementation.