Yep > Wep is easy to crack as it broadcasts chunks of information (I think it's part of the Key + a hash) but it only has so many cycles before it starts repearting itself - hence 64 bit encryption is only 40bit key and 24 bit cycle - from what I remember the cycle is the same with WEP128. / edit - acutally the whole key is trasmitted 40 or 104 bit key and 24 bit vector (0>16,777,215 possable values)
WPA and WPA2 are pretty much of a much, WPA2 I think added 802.1x authentication and maybe AES to standard WPA - but I'd have to check my notes to confirm. / edit note's checked and it's only AES encryption 802.1x was supported in WPA
The key is never actually transmitted, it runs an calculation to generate keysets from the main key and then tags a huge cycle on the end (which I think is larger than the sub keys), all of this rotates and WPA is intelligent enough to pickup spoofing attempts and can block comms for 60 seconds to an intruder device (think it's done on a mac basis). /edit, there's a per session key and per-packet keys, per packet keys use a hash of the session key and some of the IV which is increased from 24 bits in WEP to 48 bits in WPA)
The important thing to know, is that WEP uses the same key per Wifi connection (One laptop, multiple browsers would use the same key information).
WPA/WPA 2 uses one key per session (that's a different key per every browser that's open and can actually rotate them at given intervals).
I'm pretty sure that the above is fairly acurate, but I'd have to check my notes and in my defence - it's fairly late!
Kev
