Data is being transmitted from source to destination on the network. Data can be delivered successfully to the destination or data can be corrupted and lost. Data may of prime importance to an organization so there must be mechanisms in order to solve this problem. These problems can be referred to as attacks. Attacks could of many types. In this paper, the authors are focusing on WEP (Wired Equivalent Privacy). This protocol is vulnerable to related-key attack. WEP is generally used to protect Wi-Fi internet devices. In order to prevent the related key attack they will use complex relationships between encryption keys.