Wired Equivalent Privacy (WEP)
GPTKB entity
Statements (48)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:XMPP_Extension_Protocol
|
gptkbp:advises |
security experts
|
gptkbp:allows |
key management issues
key length |
gptkbp:based_on |
symmetric key cryptography
|
gptkbp:behavior |
packet sniffing
|
gptkbp:defines |
IEEE 802.11-1997 standard
RFC 3748 |
gptkbp:developed_by |
gptkb:standard
wireless security similar to wired networks |
gptkbp:discontinued |
WPA and WP A2
|
https://www.w3.org/2000/01/rdf-schema#label |
Wired Equivalent Privacy (WEP)
|
gptkbp:introduced |
gptkb:1997
|
gptkbp:is_associated_with |
data breaches
data integrity issues |
gptkbp:is_considered |
legacy technology
insecure |
gptkbp:is_criticized_for |
poor security practices
|
gptkbp:is_implemented_in |
wireless routers
|
gptkbp:is_often_used_in |
early wireless networks
|
gptkbp:is_part_of |
wireless communication standards
network security protocols wireless LAN security legacy wireless systems |
gptkbp:is_subject_to |
gptkb:municipality
security audits |
gptkbp:is_used_for |
encrypting wireless data
|
gptkbp:is_used_in |
home networks
public Wi-Fi networks |
gptkbp:is_vulnerable_to |
man-in-the-middle attacks
replay attacks key recovery attacks |
gptkbp:part_of |
gptkb:standard
|
gptkbp:provides |
data confidentiality
|
gptkbp:replaced_by |
gptkb:Wi-Fi_Protected_Access_(WPA)
gptkb:theorem WP A2 WP A3 802.11i standard |
gptkbp:requires |
shared secret key
|
gptkbp:security_features |
weak initialization vectors
|
gptkbp:suitable_for |
high-security environments
modern wireless security |
gptkbp:updates |
gptkb:theorem
|
gptkbp:uses |
R C4 stream cipher
40-bit and 104-bit keys |
gptkbp:bfsParent |
gptkb:IEEE_802.11-1999
|
gptkbp:bfsLayer |
7
|