Which of the following describes why the algorithm that was chosen by the WEP working group was not the best choice?

WEP has a long list of security vulnerabilities. Which of the following describes why the algorithm that was chosen by the WEP working group was not the best choice?

WEP has a long list of security vulnerabilities. Which of the following describes why the algorithm that was chosen by the WEP working group was not the best choice?

A.
It�s a stream cipher, which has an inherent deficiency in integrity.

B.
It�s a stream cipher, which has an inherent deficiency in key size.

C.
It�s a stream cipher, which has an inherent deficiency in being vulnerable to man-in-the-middle attacks.

D.
It�s a stream cipher, which has an inherent deficiency in being vulnerable to spoofing attacks.

Explanation:
Stream ciphers, by default, have a deficiency in that someone can
capture a message and modify the bits without the receiver being able to identify
it. This is because the message will decrypt properly.



Leave a Reply 2

Your email address will not be published. Required fields are marked *

five × three =


networkmanagers

networkmanagers

I have the same idea. A