Wired Equivalent Privacy (WEP)

GPTKB entity

Statements (48)
Predicate Object
gptkbp:instance_of gptkb:XMPP_Extension_Protocol
gptkbp:advises security experts
gptkbp:allows key management issues
key length
gptkbp:based_on symmetric key cryptography
gptkbp:behavior packet sniffing
gptkbp:defines IEEE 802.11-1997 standard
RFC 3748
gptkbp:developed_by gptkb:standard
wireless security similar to wired networks
gptkbp:discontinued WPA and WP A2
https://www.w3.org/2000/01/rdf-schema#label Wired Equivalent Privacy (WEP)
gptkbp:introduced gptkb:1997
gptkbp:is_associated_with data breaches
data integrity issues
gptkbp:is_considered legacy technology
insecure
gptkbp:is_criticized_for poor security practices
gptkbp:is_implemented_in wireless routers
gptkbp:is_often_used_in early wireless networks
gptkbp:is_part_of wireless communication standards
network security protocols
wireless LAN security
legacy wireless systems
gptkbp:is_subject_to gptkb:municipality
security audits
gptkbp:is_used_for encrypting wireless data
gptkbp:is_used_in home networks
public Wi-Fi networks
gptkbp:is_vulnerable_to man-in-the-middle attacks
replay attacks
key recovery attacks
gptkbp:part_of gptkb:standard
gptkbp:provides data confidentiality
gptkbp:replaced_by gptkb:Wi-Fi_Protected_Access_(WPA)
gptkb:theorem
WP A2
WP A3
802.11i standard
gptkbp:requires shared secret key
gptkbp:security_features weak initialization vectors
gptkbp:suitable_for high-security environments
modern wireless security
gptkbp:updates gptkb:theorem
gptkbp:uses R C4 stream cipher
40-bit and 104-bit keys
gptkbp:bfsParent gptkb:IEEE_802.11-1999
gptkbp:bfsLayer 7