Comparative Analysis of CRC-32 and SHA-1 Algorithms in WEP
Keywords:
WEP, CRC-32, SHA-1, Average End to End Delay, Packet Delivery RatioAbstract
Wireless technology has become an integral part of today’s life .WLAN is widely used in many conditions, especially when
traditional network is difficult to install. WEP is used to make wireless traffic as secure as wired network traffic .WEP suffers from
various weakness i.e. a shared key weakness, 24-bit Initialization vectors (IVs) are too short, and this puts confidentiality at risk , poor
key management etc. The CRC called cyclic redundancy check is insecure and does not prevent modification of intercepted packets.
To overcome these problems, the existing WEP protocol is modified by replacing CRC-32 with SHA-1 hash function to enhance the
security and performance of WLAN systems
Downloads
Download data is not yet available.