Login New user?  
06- Advanced Engineering Technology and Application
An International Journal
               
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Content
 

Volumes > Vol. 4 > No. 1

 
   

Comparative Analysis of CRC-32 and SHA-1 Algorithms in WEP

PP: 1-6
Author(s)
Amit Grover, Sukhchain Singh,
Abstract
Wireless technology has become an integral part of today’s life .WLAN is widely used in many conditions, especially when traditional network is difficult to install. WEP is used to make wireless traffic as secure as wired network traffic .WEP suffers from various weakness i.e. a shared key weakness, 24-bit Initialization vectors (IVs) are too short, and this puts confidentiality at risk , poor key management etc. The CRC called cyclic redundancy check is insecure and does not prevent modification of intercepted packets. To overcome these problems, the existing WEP protocol is modified by replacing CRC-32 with SHA-1 hash function to enhance the security and performance of WLAN systems

  Home   About us   News   Journals   Conferences Contact us Copyright naturalspublishing.com. All Rights Reserved