WEP Flaws and Implementation Flaws of WEP Flaws and Implementation Flaws of Authentication Protocols Authentication Protocols