What is WEP

The WEP stands for wired equivalent privacy which uses old encryption method. The WEP was designed to provide security and privacy to a wireless local area network (WLAN). WEP is one of the most commonly used security protocols for WiFi security. The wireless network transmits data in radio waves, due to which data can be easily intercepted. Without security, other people can easily eavesdrop conversations made through wireless networks this is where this WEP security comes in handy. Transmitted encrypted data can also be easily decoded due to WAP working on the old security method, so now it is used only by people whose devices do not accept new encrypted methods like WPA or WPA2.

What are the keys of WEP?

To secure the data WEP uses the two shared keys which are Unicast session key and Multicast key (also known as the global key.

Unicast session key:

The Unicast session key is an encryption key used to secure the unicast traffic between a wireless AP and a wireless client. The data transmission between two high points that is why it is called unicast which means there are only one receiver and one sender.

Multicast key:

Multicast keys secured the broadcast and multicast between a single wireless AP and all of its wireless clients. The term multicast refers that data transmission is done between one sender and many receivers or many senders and one receiver.

Authentication method

The WEP uses two types of authentication method which is Open system authentication and Shared key authentication.

Open system authentication

The open system authentication is a process in which a computing system gains access to the wireless network. With open system authentication, a computer which is installed with a wireless modem can easily access any network of WEP and can receive data that is not encrypted. This system provide authentication to client without performing any authentication process.

Shared key authentication

The shared key authentication considered more difficult than open system authentication. In the shared key authentication method computing devices uses the WEP protocol to gain access of wireless network. The process starts with with a client sending the an authentication to the access point of network. Then access point send the encrypted file to client. After that client retirn the file to examine it by access point. If the file matches to the file that is access point have in the record then access point will grant the access.

What is WPA

WPA stands for WiFi protected access which was designed in 2003 to replace WEP because WEP was not secured enough. WPA uses much better encryption method that is why it is a better option than WEP. WPA performs authentication by using a passphrase and create the initial data encryption keys. WPA-PSK uses the Temporal Key Integrity Protocol (TKIP) data encryption, applying most of the IEEE 802.11i standard.

What is WPA pre-shared key?

WiFi protector access pre-shared key is an encryption method which is used for user authentication on the wireless network. This encryption method is used by telecom companies for end-user access in local area networks.