Which Algorithm is this referring to?

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the
passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through
a technique known as wardriving.
Which Algorithm is this referring to?

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the
passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through
a technique known as wardriving.
Which Algorithm is this referring to?

A.
Wired Equivalent Privacy (WEP)

B.
Wi-Fi Protected Access (WPA)

C.
Wi-Fi Protected Access 2 (WPA2)

D.
Temporal Key Integrity Protocol (TKIP)

Explanation:
WEP is the currently most used protocol for securing 802.11 networks, also called wireless lans or wlans. In
2007, a new attack on WEP, the PTW attack, was discovered, which allows an attacker to recover the secret
key in less than 60 seconds in some cases.
Note: Wardriving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a
portable computer, smartphone or personal digital assistant (PDA).
https://events.ccc.de/camp/2007/Fahrplan/events/1943.en.html



Leave a Reply 0

Your email address will not be published. Required fields are marked *