Tools that an attacker can use to crack wep, Computer Networking

Assignment Help:

Question:

Consider that you have to configure a small WLAN of 8 computers using Wired Equivalent Privacy (WEP) and that you have to best make use of its available security features.

(a) How many keys will WEP hold and what is the key index range?

(b) Which key length could you adopt for the WEP passphrase? Provide a sample passphrase that you would have used for the configuration.

(c) The CRC field remains unencrypted during transmission. Show how an attacker can take advantage of this weakness in WEP.

(d) The Initialisation Vector (IV) used in WEP is known to be too short.

i. Describe what is meant by the term Initialisation Vector.
ii. What is the total number of IVs possible?
iii. Show how the short IV in WEP leads to security problems.

(e) List any two tools that an attacker can use to crack WEP.

(f) Show how an attacker perform a double encryption attack on this newly configured network.

(g) Briefly explain the best practices you would adopt to configure WEP in order to make best use of it.


Related Discussions:- Tools that an attacker can use to crack wep

What is an object server, With an object server, the Client/Server applicat...

With an object server, the Client/Server application is taken as a set of communicating objects. Client object commune with server objects using an Object Request Broker (ORB). The

What are the disadvantages of star topology, What are the disadvantages of ...

What are the disadvantages of Star Topology? The disadvantages are considered as follows: a. Needs more cable than most topologies. b. Moderately complex to install.

What are super servers, These are fully-loaded machines which consists of m...

These are fully-loaded machines which consists of multiprocessors, high-speed disk arrays for interview I/O and fault tolerant features.

Explain about gigabit ethernet, Gigabit Ethernet Data rate of 1000 ...

Gigabit Ethernet Data rate of 1000 Mbps or else 1 Gbps Typically implemented as full-duplex with no CSMA/CD 1000Base-X utilizes long-wave optical fiber (1000Base-

WOrkstation, Interdepences of workstation hardware and software

Interdepences of workstation hardware and software

Define v - 32 modem, Q. Define V - 32 modem? - ITU-T's V.32 standard w...

Q. Define V - 32 modem? - ITU-T's V.32 standard was issued in 1989 for asynchronous and full-duplex operation at 9600 bps. - Even though designed for asynchronous DTEs two

What is net stat, What is net stat? Netstat is a command line utility p...

What is net stat? Netstat is a command line utility program. It gives useful information about the current TCP/IP settings of a connection.

Define co-axial cable, Define Co-axial cable. A solid central conducto...

Define Co-axial cable. A solid central conductor surrounded by insulating material and then by a cylindrical shield woven from fine wires is called as co-axial cable. The shie

What is the advantage of address sharing, What is the advantage of address ...

What is the advantage of address sharing? By using address translation instead of routing, address sharing gives an inherent security benefit. That's because host PCs on the In

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd