Question: Consider the following pseudo-WEP protocol. The key is 6 bits and the IV is 2 bits. The IV is appended to the end of the

Consider the following pseudo-WEP protocol. The key is 6 bits and the IV is 2 bits. The IV is appended to the end of the key when generating the keystream. Suppose that the shared secret-key is 101001.The keystreams for the four possible inputs are as follows: 10100100 1100101101010101001011010100100... 10100101: 0110011011001010110100100101101... 10100110: 1010111010111100010100101001111... 10100111: 1111101010001000101010100010111... Suppose all messages are 8-bits long and the ICV (integrity check) uses Cyclic Redundancy Check (CRC) code on each message with the generator G = 10011 and r = 4. So the ICV is it long Suppose the pseudo-WEP packet consists of three fields: first the IV field, then the message field, and last the ICV field, with last two fields encrypted. (1) We want to send the message m = 11010111 using the above pseudo-WEP protocol with IV = 11. What will be the value of the ICV before encryption? (2) Consider the same assumption in (1). What will be the values of the encrypted message m and the encrypted ICV, respectively? (3) What is the weakness of the original WEP? Use an example to show the potential attack. Consider the following pseudo-WEP protocol. The key is 6 bits and the IV is 2 bits. The IV is appended to the end of the key when generating the keystream. Suppose that the shared secret-key is 101001.The keystreams for the four possible inputs are as follows: 10100100 1100101101010101001011010100100... 10100101: 0110011011001010110100100101101... 10100110: 1010111010111100010100101001111... 10100111: 1111101010001000101010100010111... Suppose all messages are 8-bits long and the ICV (integrity check) uses Cyclic Redundancy Check (CRC) code on each message with the generator G = 10011 and r = 4. So the ICV is it long Suppose the pseudo-WEP packet consists of three fields: first the IV field, then the message field, and last the ICV field, with last two fields encrypted. (1) We want to send the message m = 11010111 using the above pseudo-WEP protocol with IV = 11. What will be the value of the ICV before encryption? (2) Consider the same assumption in (1). What will be the values of the encrypted message m and the encrypted ICV, respectively? (3) What is the weakness of the original WEP? Use an example to show the potential attack
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
