WEP has a long list of security vulnerabilities. Which of the following describes why the algorithm that was chosen by the WEP working group was not the best choice?

A.
It�s a stream cipher, which has an inherent deficiency in integrity.
B.
It�s a stream cipher, which has an inherent deficiency in key size.
C.
It�s a stream cipher, which has an inherent deficiency in being vulnerable to man-in-the-middle attacks.
D.
It�s a stream cipher, which has an inherent deficiency in being vulnerable to spoofing attacks.
Explanation:
Stream ciphers, by default, have a deficiency in that someone can
capture a message and modify the bits without the receiver being able to identify
it. This is because the message will decrypt properly.
I have the same idea. A
0
0
I chose B
0
0