ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

PERFORMANCE AND SECURITY EVALUATION BY USING SHA3 IN WEP

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 3)

Publication Date:

Authors : ; ;

Page : 353-358

Keywords : WEP; SHA3; SHA2; CRC-32; SHA; WPA;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In this paper we have discussed the wireless networks, security issues in wireless networks, and WEP (Wired Equivalent Privacy Protocol) .We have given the details of various limitations of WEP, how they can be eliminated by various cryptographic hash algorithms. We also proposed that how by replacing CRC-32 in WEP with SHA-3 can lead to improvement in the performance of WEP as compare to, when SHA-1 is used in that place.

Last modified: 2015-04-03 21:23:10