<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="ko">
	<id>https://wiki.mathnt.net/index.php?action=history&amp;feed=atom&amp;title=%EC%9C%A0%EC%84%A0_%EB%8F%99%EB%93%B1_%ED%94%84%EB%9D%BC%EC%9D%B4%EB%B2%84%EC%8B%9C</id>
	<title>유선 동등 프라이버시 - 편집 역사</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.mathnt.net/index.php?action=history&amp;feed=atom&amp;title=%EC%9C%A0%EC%84%A0_%EB%8F%99%EB%93%B1_%ED%94%84%EB%9D%BC%EC%9D%B4%EB%B2%84%EC%8B%9C"/>
	<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=%EC%9C%A0%EC%84%A0_%EB%8F%99%EB%93%B1_%ED%94%84%EB%9D%BC%EC%9D%B4%EB%B2%84%EC%8B%9C&amp;action=history"/>
	<updated>2026-04-09T10:49:13Z</updated>
	<subtitle>이 문서의 편집 역사</subtitle>
	<generator>MediaWiki 1.35.0</generator>
	<entry>
		<id>https://wiki.mathnt.net/index.php?title=%EC%9C%A0%EC%84%A0_%EB%8F%99%EB%93%B1_%ED%94%84%EB%9D%BC%EC%9D%B4%EB%B2%84%EC%8B%9C&amp;diff=51304&amp;oldid=prev</id>
		<title>2021년 2월 17일 (수) 08:14에 Pythagoras0님의 편집</title>
		<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=%EC%9C%A0%EC%84%A0_%EB%8F%99%EB%93%B1_%ED%94%84%EB%9D%BC%EC%9D%B4%EB%B2%84%EC%8B%9C&amp;diff=51304&amp;oldid=prev"/>
		<updated>2021-02-17T08:14:13Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;ko&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← 이전 판&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;2021년 2월 17일 (수) 08:14 판&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l79&quot; &gt;79번째 줄:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;79번째 줄:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== 메타데이터 ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==메타데이터==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===위키데이터===&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===위키데이터===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ID :  [https://www.wikidata.org/wiki/Q273673 Q273673]&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ID :  [https://www.wikidata.org/wiki/Q273673 Q273673]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;===Spacy 패턴 목록===&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [{&amp;#039;LOWER&amp;#039;: &amp;#039;wired&amp;#039;}, {&amp;#039;LOWER&amp;#039;: &amp;#039;equivalent&amp;#039;}, {&amp;#039;LEMMA&amp;#039;: &amp;#039;Privacy&amp;#039;}]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [{&amp;#039;LEMMA&amp;#039;: &amp;#039;WEP&amp;#039;}]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [{&amp;#039;LOWER&amp;#039;: &amp;#039;wireless&amp;#039;}, {&amp;#039;LOWER&amp;#039;: &amp;#039;encryption&amp;#039;}, {&amp;#039;LEMMA&amp;#039;: &amp;#039;Protocol&amp;#039;}]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Pythagoras0</name></author>
	</entry>
	<entry>
		<id>https://wiki.mathnt.net/index.php?title=%EC%9C%A0%EC%84%A0_%EB%8F%99%EB%93%B1_%ED%94%84%EB%9D%BC%EC%9D%B4%EB%B2%84%EC%8B%9C&amp;diff=47101&amp;oldid=prev</id>
		<title>Pythagoras0: /* 메타데이터 */ 새 문단</title>
		<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=%EC%9C%A0%EC%84%A0_%EB%8F%99%EB%93%B1_%ED%94%84%EB%9D%BC%EC%9D%B4%EB%B2%84%EC%8B%9C&amp;diff=47101&amp;oldid=prev"/>
		<updated>2020-12-26T12:20:52Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;메타데이터: &lt;/span&gt; 새 문단&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;ko&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← 이전 판&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;2020년 12월 26일 (토) 12:20 판&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l78&quot; &gt;78번째 줄:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;78번째 줄:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===소스===&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===소스===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;== 메타데이터 ==&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;===위키데이터===&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* ID :  [https://www.wikidata.org/wiki/Q273673 Q273673]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Pythagoras0</name></author>
	</entry>
	<entry>
		<id>https://wiki.mathnt.net/index.php?title=%EC%9C%A0%EC%84%A0_%EB%8F%99%EB%93%B1_%ED%94%84%EB%9D%BC%EC%9D%B4%EB%B2%84%EC%8B%9C&amp;diff=46217&amp;oldid=prev</id>
		<title>Pythagoras0: /* 노트 */ 새 문단</title>
		<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=%EC%9C%A0%EC%84%A0_%EB%8F%99%EB%93%B1_%ED%94%84%EB%9D%BC%EC%9D%B4%EB%B2%84%EC%8B%9C&amp;diff=46217&amp;oldid=prev"/>
		<updated>2020-12-21T09:54:22Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;노트: &lt;/span&gt; 새 문단&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;새 문서&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== 노트 ==&lt;br /&gt;
&lt;br /&gt;
===위키데이터===&lt;br /&gt;
* ID :  [https://www.wikidata.org/wiki/Q273673 Q273673]&lt;br /&gt;
===말뭉치===&lt;br /&gt;
# The wired equivalent privacy protocol adds security to a wireless network by encrypting the data.&amp;lt;ref name=&amp;quot;ref_cc778c72&amp;quot;&amp;gt;[https://techterms.com/definition/wep WEP (Wired Equivalent Privacy) Definition]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Systems on a WEP-secured network can typically be authorized by entering a network password.&amp;lt;ref name=&amp;quot;ref_cc778c72&amp;quot; /&amp;gt;&lt;br /&gt;
# iLabs3 reported that it could take a relatively long period of “sniffing” on a heavily loaded network to get enough of the weak initialization vectors to crack a 128-bit WEP key.&amp;lt;ref name=&amp;quot;ref_7dd0ee18&amp;quot;&amp;gt;[https://www.sciencedirect.com/topics/engineering/wired-equivalent-privacy Wired Equivalent Privacy - an overview]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# WEP (wired equivalent privacy) is a standard network protocol that adds security to Wi-Fi and other 802.11 wireless networks.&amp;lt;ref name=&amp;quot;ref_6f24ccc2&amp;quot;&amp;gt;[https://www.lifewire.com/definition-of-wired-equivalent-privacy-816575 WEP (Wired Equivalent Privacy)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# WEP was designed to give wireless networks the same level of privacy protection as a comparable wired network, but technical flaws greatly limit its usefulness.&amp;lt;ref name=&amp;quot;ref_6f24ccc2&amp;quot; /&amp;gt;&lt;br /&gt;
# The original implementations of WEP supported encryption keys of 40 bits plus 24 additional bits of system-generated data, leading to keys of 64 bits in total length.&amp;lt;ref name=&amp;quot;ref_6f24ccc2&amp;quot; /&amp;gt;&lt;br /&gt;
# When deployed over a Wi-Fi connection, WEP encrypts the data stream using these keys so that it is no longer human-readable but can be processed by receiving devices.&amp;lt;ref name=&amp;quot;ref_6f24ccc2&amp;quot; /&amp;gt;&lt;br /&gt;
# Equivalent Privacy (also known as the WEP) is a security algorithm introduced to provide data confidentiality for wireless networks.&amp;lt;ref name=&amp;quot;ref_1fbdb001&amp;quot;&amp;gt;[https://blog.logsign.com/what-is-wired-equivalent-privacy-wep-encryption/ What is Wired Equivalent Privacy (WEP) Encryption?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Wired Equivalent Privacy was brought as part of the 802.11 standard.&amp;lt;ref name=&amp;quot;ref_1fbdb001&amp;quot; /&amp;gt;&lt;br /&gt;
# Wired Equivalent Privacy aims to add a layer of security to the wireless network through offering a strong encryption to the data.&amp;lt;ref name=&amp;quot;ref_1fbdb001&amp;quot; /&amp;gt;&lt;br /&gt;
# WEP aims to protect and keep the integrity of the data.&amp;lt;ref name=&amp;quot;ref_1fbdb001&amp;quot; /&amp;gt;&lt;br /&gt;
# WEP was the only encryption protocol available to 802.11a and 802.11b devices built before the WPA standard, which was available for 802.11g devices.&amp;lt;ref name=&amp;quot;ref_5edaa58a&amp;quot;&amp;gt;[https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy Wired Equivalent Privacy]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Standard 64-bit WEP uses a 40 bit key (also known as WEP-40), which is concatenated with a 24-bit initialization vector (IV) to form the RC4 key.&amp;lt;ref name=&amp;quot;ref_5edaa58a&amp;quot; /&amp;gt;&lt;br /&gt;
# At the time that the original WEP standard was drafted, the U.S. Government&amp;#039;s export restrictions on cryptographic technology limited the key size.&amp;lt;ref name=&amp;quot;ref_5edaa58a&amp;quot; /&amp;gt;&lt;br /&gt;
# A 64-bit WEP key is usually entered as a string of 10 hexadecimal (base 16) characters (0–9 and A–F).&amp;lt;ref name=&amp;quot;ref_5edaa58a&amp;quot; /&amp;gt;&lt;br /&gt;
# WEP seeks to establish similar protection to that offered by the wired network&amp;#039;s physical security measures by encrypting data transmitted over the WLAN.&amp;lt;ref name=&amp;quot;ref_9b9a6ff1&amp;quot;&amp;gt;[https://searchsecurity.techtarget.com/definition/Wired-Equivalent-Privacy What is Wired Equivalent Privacy (WEP)?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Thus, WEP adds security to a wireless network by encrypting this data.&amp;lt;ref name=&amp;quot;ref_f5a34bc5&amp;quot;&amp;gt;[https://www.speedcheck.org/wiki/wep/ What is WEP?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# In order for WEP to work, it implements a data encryption scheme which utilizes a combination and mix of user and system-generated key values.&amp;lt;ref name=&amp;quot;ref_f5a34bc5&amp;quot; /&amp;gt;&lt;br /&gt;
# 40 bits plus additional bits of system-generated data encryption keys are supported by the original implementations of WEP.&amp;lt;ref name=&amp;quot;ref_f5a34bc5&amp;quot; /&amp;gt;&lt;br /&gt;
# Once WEP has been deployed over a Wi-Fi connection, it will encrypt the data stream through the use of coded keys so that it will no longer be readable by users.&amp;lt;ref name=&amp;quot;ref_f5a34bc5&amp;quot; /&amp;gt;&lt;br /&gt;
# WEP can be used for both authentication and privacy with your wireless network.&amp;lt;ref name=&amp;quot;ref_b76fd8c7&amp;quot;&amp;gt;[http://www.qnx.com/developers/docs/qnxcar2/topic/com.qnx.doc.core_networking.user_guide/topic/wpa_background_Connecting_WEP.html Using WEP (Wired Equivalent Privacy) for authentication and encryption]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Note: If your WEP station is active, but no traffic seems to be going through (e.g. dhcp.client doesn&amp;#039;t work), check the key used for bringing up the connection.&amp;lt;ref name=&amp;quot;ref_b76fd8c7&amp;quot; /&amp;gt;&lt;br /&gt;
# Note that many access points offer the capability of entering a passphrase that can be used to generate the associated WEP keys.&amp;lt;ref name=&amp;quot;ref_b76fd8c7&amp;quot; /&amp;gt;&lt;br /&gt;
# The WEP key must be either 40 bits long or 104 bits long.&amp;lt;ref name=&amp;quot;ref_b76fd8c7&amp;quot; /&amp;gt;&lt;br /&gt;
# Definition - What does Wired Equivalent Privacy (WEP) mean?&amp;lt;ref name=&amp;quot;ref_7d90f966&amp;quot;&amp;gt;[https://www.techopedia.com/definition/4170/wired-equivalent-privacy-wep What is Wired Equivalent Privacy (WEP)?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Wired Equivalent Privacy or WEP is a security protocol or algorithm which is created for the Wi-Fi or IEEE 802.11 wireless networks.&amp;lt;ref name=&amp;quot;ref_bd1d2e74&amp;quot;&amp;gt;[https://www.poftut.com/what-is-wep-wired-equivalent-privacy/ What Is WEP (Wired Equivalent Privacy)? – POFTUT]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The first version of the WEP standard was not so secure and can be easily hacked with regular tools.&amp;lt;ref name=&amp;quot;ref_bd1d2e74&amp;quot; /&amp;gt;&lt;br /&gt;
# WEP security provides different functions like confidentiality, integrity, encryption.&amp;lt;ref name=&amp;quot;ref_bd1d2e74&amp;quot; /&amp;gt;&lt;br /&gt;
# WEP uses RC4 for confidentiality and encryption and CRC-32 checksum for integrity.&amp;lt;ref name=&amp;quot;ref_bd1d2e74&amp;quot; /&amp;gt;&lt;br /&gt;
# If WEP is so bad, why bother with it?&amp;lt;ref name=&amp;quot;ref_74050016&amp;quot;&amp;gt;[https://www.oreilly.com/library/view/80211-wireless-networks/0596100523/ch05.html 802.11 Wireless Networks: The Definitive Guide, 2nd Edition [Book]]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# WEP’s design is easy to implement.&amp;lt;ref name=&amp;quot;ref_74050016&amp;quot; /&amp;gt;&lt;br /&gt;
# WEP is so called because it was designed to provide the same level of security as that of a wired LAN.&amp;lt;ref name=&amp;quot;ref_34ed8c38&amp;quot;&amp;gt;[https://www.ipv6.com/wireless/wep-wired-equivalent-privacy/ WEP – Wired Equivalent Privacy]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# WEP was one of the first attempts to fix this insecurity issue in wireless LANs.&amp;lt;ref name=&amp;quot;ref_34ed8c38&amp;quot; /&amp;gt;&lt;br /&gt;
# WEP is self-synchronizing for each message.&amp;lt;ref name=&amp;quot;ref_34ed8c38&amp;quot; /&amp;gt;&lt;br /&gt;
# WEP is used at the two lowest layers of the OSI model – the data link and physical layers.&amp;lt;ref name=&amp;quot;ref_34ed8c38&amp;quot; /&amp;gt;&lt;br /&gt;
# Protocolor it might even be Wired Equivalent Privacy.&amp;lt;ref name=&amp;quot;ref_2077b81c&amp;quot;&amp;gt;[https://www.ciscopress.com/articles/article.asp?p=177383&amp;amp;seqNum=6 Wireless Security &amp;gt; Wireless Security]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# There is a lot of misconception surrounding WEP, so let&amp;#039;s clear that up right away.&amp;lt;ref name=&amp;quot;ref_2077b81c&amp;quot; /&amp;gt;&lt;br /&gt;
# WEP is not, nor was it ever meant to be, a security algorithm.&amp;lt;ref name=&amp;quot;ref_2077b81c&amp;quot; /&amp;gt;&lt;br /&gt;
# WEP was never designed to protect your data from script kiddies or from more intelligent attackers who want to discover your secrets.&amp;lt;ref name=&amp;quot;ref_2077b81c&amp;quot; /&amp;gt;&lt;br /&gt;
# Wired Equivalent Privacy (WEP) is specified by IEEE 802.11 for encryption and authentication.&amp;lt;ref name=&amp;quot;ref_cf4229d9&amp;quot;&amp;gt;[https://www.vocal.com/secure-communication/wired-equivalent-privacy-wep/ Wired Equivalent Privacy (WEP)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The standard describes WEP as having two main parts.&amp;lt;ref name=&amp;quot;ref_cf4229d9&amp;quot; /&amp;gt;&lt;br /&gt;
# The encryption process used by WEP is Rivest Cipher 4 (RC4).&amp;lt;ref name=&amp;quot;ref_cf4229d9&amp;quot; /&amp;gt;&lt;br /&gt;
# In this paper, we present a practical key recovery attack on WEP, the link-layer security protocol for 802.11b wireless networks.&amp;lt;ref name=&amp;quot;ref_0bc14216&amp;quot;&amp;gt;[https://dl.acm.org/doi/10.1145/996943.996948 A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# This paper describes how to apply this flaw to breaking WEP, our implementation of the attack, and optimizations that can be used to reduce the number of packets required for the attack.&amp;lt;ref name=&amp;quot;ref_0bc14216&amp;quot; /&amp;gt;&lt;br /&gt;
# We conclude that the 802.11b WEP standard is completely insecure, and we provide recommendations on how this vulnerability could be mitigated and repaired.&amp;lt;ref name=&amp;quot;ref_0bc14216&amp;quot; /&amp;gt;&lt;br /&gt;
# For example, WEP and WPA are widely deployed on current WLAN systems.&amp;lt;ref name=&amp;quot;ref_7709767a&amp;quot;&amp;gt;[https://patents.google.com/patent/US8281392B2/en US8281392B2 - Methods and systems for wired equivalent privacy and Wi-Fi protected access protection - Google Patents]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# WEP can be cracked by sniffing frames from the WLAN and using brute force or mathematical algorithms to break the key.&amp;lt;ref name=&amp;quot;ref_7709767a&amp;quot; /&amp;gt;&lt;br /&gt;
# Therefore, methods and systems are needed to protect existing WEP and WPA WLAN deployments.&amp;lt;ref name=&amp;quot;ref_7709767a&amp;quot; /&amp;gt;&lt;br /&gt;
# 3 is a table illustrating attributes of WEP and WPA encryption.&amp;lt;ref name=&amp;quot;ref_7709767a&amp;quot; /&amp;gt;&lt;br /&gt;
# WEP, recognizable by the key of 10 or 26 hexadecimal digits, is widely in use and is often the first security choice presented to users by router configuration tools.&amp;lt;ref name=&amp;quot;ref_c64504ac&amp;quot;&amp;gt;[https://www.definitions.net/definition/Wired+Equivalent+Privacy What does Wired Equivalent Privacy mean?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Although its name implies that it is as secure as a wired connection, WEP has been demonstrated to have numerous flaws and has been deprecated in favour of newer standards such as WPA2.&amp;lt;ref name=&amp;quot;ref_c64504ac&amp;quot; /&amp;gt;&lt;br /&gt;
# Equivalent Privacy (WEP) was introduced as part of the original 802.11 protocol in 1997, to provide confidentiality as that of wired network.&amp;lt;ref name=&amp;quot;ref_a22e1ea5&amp;quot;&amp;gt;[https://www.omnisecu.com/security/infrastructure-and-email-security/wired-equivalent-privacy-wep.php Wired Equivalent Privacy (WEP) and the security weakness of Wired Equivalent Privacy (WEP)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Wired Equivalent Privacy (WEP) has many security flaws, one of which involves its use of Initialization Vectors (IV).&amp;lt;ref name=&amp;quot;ref_a22e1ea5&amp;quot; /&amp;gt;&lt;br /&gt;
# For encryption, Wired Equivalent Privacy (WEP) can use only a 64-bit or 128-bit number, which is made up of a 24-bit Initialization Vector (IV) and a 40-bit or 104-bit default key.&amp;lt;ref name=&amp;quot;ref_a22e1ea5&amp;quot; /&amp;gt;&lt;br /&gt;
# The Wired Equivalent Privacy (WEP) also creates a detectable pattern for attackers.&amp;lt;ref name=&amp;quot;ref_a22e1ea5&amp;quot; /&amp;gt;&lt;br /&gt;
# WEP is a standard security protocol on the wireless or wifi network, it encrypts communication across the wireless or wifi network to prevent their disclosure if a third party intercepts it.&amp;lt;ref name=&amp;quot;ref_60d133f3&amp;quot;&amp;gt;[https://cyberranges.com/glossary-term/wired-equivalent-privacy-wep/ Wired Equivalent Privacy (WEP)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Standard 64-bit WEP uses a 40 bit key (also known as WEP-40), which is concatenated with a 24-bit initialization vector (IV) to form the RC4 traffic key.&amp;lt;ref name=&amp;quot;ref_1818b754&amp;quot;&amp;gt;[https://cryptography.fandom.com/wiki/Wired_Equivalent_Privacy Wired Equivalent Privacy]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# At the time that the original WEP standard was being drafted, U.S. Government export restrictions on cryptographic technology limited the key size.&amp;lt;ref name=&amp;quot;ref_1818b754&amp;quot; /&amp;gt;&lt;br /&gt;
# A 128-bit WEP key is almost always entered by users as a string of 26 hexadecimal (base 16) characters (0-9 and A-F).&amp;lt;ref name=&amp;quot;ref_1818b754&amp;quot; /&amp;gt;&lt;br /&gt;
# A 256-bit WEP system is available from some vendors, and as with the 128-bit key system, 24 bits of that is for the IV, leaving 232 actual bits for protection.&amp;lt;ref name=&amp;quot;ref_1818b754&amp;quot; /&amp;gt;&lt;br /&gt;
# In fact, so many security problems were discovered with WEP that it is not recommended to be used and no patches were created to fix the wholes.&amp;lt;ref name=&amp;quot;ref_acd69e88&amp;quot;&amp;gt;[https://cyberhoot.com/cybrary/wired-equivalent-privacy-wep/ Wired Equivalent Privacy (WEP)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# WEP was fully developed in 1999 but was added to the IEEE 802.11b standards way before 1997 indicating that how much hope depended on its’ production.&amp;lt;ref name=&amp;quot;ref_3b3d9772&amp;quot;&amp;gt;[https://snabaynetworking.com/wired-equivalent-privacy-wep/ What is Wired Equivalent Privacy (WEP)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Even though today WEP has been replaced by the WPA protocol, it was once the topmost choice among the experts and users both.&amp;lt;ref name=&amp;quot;ref_3b3d9772&amp;quot; /&amp;gt;&lt;br /&gt;
# As any of the encryption tools, the WEP first authenticates and then encrypts the data.&amp;lt;ref name=&amp;quot;ref_3b3d9772&amp;quot; /&amp;gt;&lt;br /&gt;
# This is how Wired Equivalent Privacy guards your data the same way data is guarded in wired technology.&amp;lt;ref name=&amp;quot;ref_3b3d9772&amp;quot; /&amp;gt;&lt;br /&gt;
# WEP was carried forward, unchanged, in the next version of the standard, IEEE 802.11-1999.&amp;lt;ref name=&amp;quot;ref_b2f82854&amp;quot;&amp;gt;[https://flylib.com/books/en/2.799.1.49/1/ Wired-Equivalent Privacy (WEP)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# WEP was designed to be a simple, yet secure-enough technology that could be implemented in software or firmware for little or no cost.&amp;lt;ref name=&amp;quot;ref_b2f82854&amp;quot; /&amp;gt;&lt;br /&gt;
# Unfortunately, the design of WEP turned out to include a number of fatal flaws.&amp;lt;ref name=&amp;quot;ref_b2f82854&amp;quot; /&amp;gt;&lt;br /&gt;
# In the course of describing how WEP works, we will have the opportunity to describe what is broken.&amp;lt;ref name=&amp;quot;ref_b2f82854&amp;quot; /&amp;gt;&lt;br /&gt;
# WEP protocol uses the RC4 algorithm to encrypt data and uses CRC-32 algorithm to verify the integrity of data.&amp;lt;ref name=&amp;quot;ref_50f00144&amp;quot;&amp;gt;[http://www.iieta.org/journals/rces/paper/10.18280/rces.060103 Analysis and Improvement of Wired Equivalent Privacy Protocol]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# In the currently used WEP protocol, bag key is an RC4 key that usually consists of 24 bits IV and 40 (or 104) bits user key.&amp;lt;ref name=&amp;quot;ref_50f00144&amp;quot; /&amp;gt;&lt;br /&gt;
# However, some special IV will leak the key’s WEP package and analysis it to get key.&amp;lt;ref name=&amp;quot;ref_50f00144&amp;quot; /&amp;gt;&lt;br /&gt;
===소스===&lt;br /&gt;
 &amp;lt;references /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pythagoras0</name></author>
	</entry>
</feed>