PERFORMANCE AND SECURITY EVALUATION BY USING SHA3 IN WEP
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 3)Publication Date: 2015-03-30
Authors : Ashish Kumar; Vishal Arora;
Page : 353-358
Keywords : WEP; SHA3; SHA2; CRC-32; SHA; WPA;
Abstract
In this paper we have discussed the wireless networks, security issues in wireless networks, and WEP (Wired Equivalent Privacy Protocol) .We have given the details of various limitations of WEP, how they can be eliminated by various cryptographic hash algorithms. We also proposed that how by replacing CRC-32 in WEP with SHA-3 can lead to improvement in the performance of WEP as compare to, when SHA-1 is used in that place.
Other Latest Articles
- ANTIMICROBIAL SCREENING OF CALLUS EXTRACTS OF CANTHIUM PARVIFLORUM LAM
- EXPERIMENTAL INVESTIGATION ON PERFORMANCE AND EMISSION CHARACTERISTICS OF DIESEL-ETHANOL-BIODIESEL BLEND IN DIESEL ENGINE
- ARTIFICIAL NEURAL NETWORKS FOR ASSESSING PERMEABILITY CHARACTERISTICS OF SOILS
- SIMULATION OF TEMPERATURE, VISCOSITYAND FLOW STRESS DURING FRICTION STIR WELDING ON AA6063IN T-JOINT
- INSPECTION OF CNC MADE PARTS
Last modified: 2015-04-03 21:23:10