Computers and Technology
Computers and Technology, 20.12.2019 19:31, jimena15

Wep is supposed to protect data sent over a wireless link. as discussed in the text, wep has many security flaws, one of which involves its use of initialization vectors, or ivs. wep ivs are 24 bits long. wep uses a fixed long-term key k. for each packet, wep sends an iv in the clear along with the encrypted packet, where the packet is encrypted with a stream cipher using the key kjy = (iv, k), that is, the iv is pre-pended to the long-term key k.
suppose that a particular wep connection sends packets containing 1500 bytes over an 11 mbps link.
a. if the ivs are chosen at random, what is the expected amount of time until the first iv repeats? what is the expected amount of time until some iv repeats?
b) why is a repeated iv a security concern?

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 08:00, lindseyreneesmith7
Digital information is stored using a series of ones and zeros. computers are digital machines because they can only read information as on or off –1 or 0. this method of computation is known as the system
Answers: 1
image
Computers and Technology, 23.06.2019 06:20, Ab20600
Which text function capitalizes the first letter in a string of text? question 10 options: upper capital first proper
Answers: 1
image
Computers and Technology, 23.06.2019 12:40, Emilyvite6251
According to the video what are some tasks petroleum engineers perform check all that apply
Answers: 2
image
Computers and Technology, 24.06.2019 04:30, shadenShaden2037
What is the process in which the software development team compiles information to determine the final product
Answers: 1
Do you know the correct answer?
Wep is supposed to protect data sent over a wireless link. as discussed in the text, wep has many se...

Questions in other subjects: