What Is The Difference Between 40-Bit And 64-Bit Wep; What Is A Wep Key; Will 128-Bit Wep Communicate With 64-Bit Wep; Can The Ssid Be Encrypted - ZyXEL Communications P-661HW-D Series Support Note

802.11g wireless adsl2+ 4-port security gateway
Hide thumbs Also See for P-661HW-D Series:
Table of Contents

Advertisement

P-661HW-D Series Support Notes

4. What is the difference between 40-bit and 64-bit WEP?

40 bit WEP and 64 bit WEP are the same encryption level and can interoperate.
The lower level of WEP encryption uses a 40 bit (10 Hex character) as "secret
key" (set by user), and a 24 bit "Initialization Vector" (not under user control)
(40+24=64). Some vendors refer to this level of WEP as 40 bit, others as 64
bit.

5. What is a WEP key?

A WEP key is a user defined string of characters used to encrypt and decrypt
data.

6. Will 128-bit WEP communicate with 64-bit WEP?

No. 128-bit WEP will not communicate with 64-bit WEP. Although 128 bit WEP
also uses a 24 bit Initialization Vector, but it uses a 104 bit as secret key. Users
need to use the same encryption level in order to make a connection.

7. Can the SSID be encrypted?

No, WEP only encrypts the data packets not the 802.11 management
packets.The SSID is in the beacon and probe management messages and
SSID goes over the air in clear text. This makes obtaining the SSID easy by
sniffing 802.11 wireless traffic.

8. By turning off the broadcast of SSID, can someone still sniff the SSID?

Many APs by default have broadcasting the SSID turned on. Sniffers typically
will find the SSID in the broadcast beacon packets. Turning off the broadcast of
SSID in the beacon message (a common practice) does not prevent getting
the SSID; since the SSID is sent in the clear in the probe message when a
client associates to an AP, a sniffer just has to wait for a valid user to associate
to the network to see the SSID.

9. What are Insertion Attacks?

The insertion attacks are based on placing unauthorized devices on the
wireless network without going through a security process and review.

10. What is Wireless Sniffer?

An attacker can sniff and capture legitimate traffic. Many of the sniffer tools for
Ethernet are based on capturing the first part of the connection session, where
the data would typically include the username and password. An intruder can
masquerade as that user by using this captured information. An intruder who
monitors the wireless network can apply this same attack principle on the
wireless.

11. What is OTIST? How do I use it?

45
All contents copyright © 2006 ZyXEL Communications Corporation.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents