Comparative Analysis of CRC-32 and SHA-1 Algorithms in WEP

Authors

  • Amit Grover Department of Electronics & Communication Engineering, S.B.S State Technical Campus Ferozepur, Punjab, India
  • Sukhchain Singh Department of Electronics & Communication Engineering, Ferozepur college of Engineering and Technology, Ferozepur, Punjab, India

Keywords:

WEP, CRC-32, SHA-1, Average End to End Delay, Packet Delivery Ratio

Abstract

Wireless technology has become an integral part of today’s life .WLAN is widely used in many conditions, especially when

traditional network is difficult to install. WEP is used to make wireless traffic as secure as wired network traffic .WEP suffers from

various weakness i.e. a shared key weakness, 24-bit Initialization vectors (IVs) are too short, and this puts confidentiality at risk , poor

key management etc. The CRC called cyclic redundancy check is insecure and does not prevent modification of intercepted packets.

To overcome these problems, the existing WEP protocol is modified by replacing CRC-32 with SHA-1 hash function to enhance the

security and performance of WLAN systems

Downloads

Download data is not yet available.

Downloads

Published

2026-01-23

Issue

Section

Articles