A security mechanism suitable for wireless local area networks is
disclosed that exhibits a reasonable trade-off between computation speed
and resistance to attack. The illustrative embodiment can be implemented
with operations that are quickly performed on most processors, and,
therefore be in many cases reasonably implemented in software. The
illustrative embodiment comprises modulo 2 additions, modulo 2.sup.B
additions, bit rotations, and byte transpositions.