Beta
199907

Comparative Analysis of CRC-32 and SHA-1 Algorithms in WEP

Article

Last updated: 23 Jan 2023

Subjects

-

Tags

-

Abstract

Wireless technology has become an integral part of today's life .WLAN is widely used in many conditions, especially when traditional network is difficult to install. WEP is used to ma ke wireless traffic as secure as wired network traffic .WEP suf fers from various weakness i.e. a shared key weakness, 24-bit Initialization vectors (IVs) are too short, and this puts confidenti ality at risk , poor key management etc. The CRC called cyclic redundancy check is insecure and does not prevent modification of intercepted p ackets. To overcome these problems, the existing WEP protocol is modified by replacing CRC-32 with SHA-1 hash function to enhance the security and performance of WLAN systems

DOI

10.21608/aeta.2015.199907

Keywords

WEP, CRC-32, SHA-1, Average End to End Delay, Packet Delivery Ratio

Authors

First Name

Amit

Last Name

Grover

MiddleName

-

Affiliation

Department of Electronics & Communication Engineering, S.B.S State Technical Campus Ferozepur, Punjab, India

Email

-

City

-

Orcid

-

First Name

Sukhchain

Last Name

Singh

MiddleName

-

Affiliation

Department of Electronics & Communication Engineering, Ferozepur college of Engineering and Technology, Ferozepur, Punjab, India

Email

-

City

-

Orcid

-

Volume

4

Article Issue

1

Related Issue

28195

Issue Date

2015-01-01

Receive Date

2021-10-17

Publish Date

2015-01-01

Page Start

5

Page End

10

Print ISSN

2090-9535

Online ISSN

2090-9543

Link

https://aeta.journals.ekb.eg/article_199907.html

Detail API

https://aeta.journals.ekb.eg/service?article_code=199907

Order

199,907

Type

Original Article

Type Code

2,017

Publication Type

Journal

Publication Title

Advanced Engineering Technology and Application

Publication Link

https://aeta.journals.ekb.eg/

MainTitle

-

Details

Type

Article

Created At

23 Jan 2023