First page Back Continue Last page Overview Graphics
RC-4 Continued
Generally acknowledged to be not secure in general use, still safe for some restricted uses
WPA uses Temporal Key Integrity Protocol and Hashed MACs to minimize exposure to some of the algorithm’s problems that were exploited in WEP