Back to Search
Start Over
A Key Recovery Attack on the 802.11b Wired Equivalent Privacy Protocol (WEP).
- Source :
- ACM Transactions on Information & System Security (TISSEC); May2004, Vol. 7 Issue 2, p319-332, 14p, 4 Charts
- Publication Year :
- 2004
-
Abstract
- In this paper, we present a practical key recovery attack on WEP, the link-layer security protocol for 802.1lb wireless networks. The attack is based on a partial key exposure vulnerability in the RC4 stream cipher discovered by Fluhrer, Mantin, and Shamir. This paper describes how to apply this flaw to breaking WEP, our implementation of the attack, and optimizations that can be used to reduce the number of packets required for the attack. We conclude that the 802.1lb WEP standard is completely insecure, and we provide recommendations on how this vulnerability could be mitigated and repaired. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 10949224
- Volume :
- 7
- Issue :
- 2
- Database :
- Complementary Index
- Journal :
- ACM Transactions on Information & System Security (TISSEC)
- Publication Type :
- Academic Journal
- Accession number :
- 13809332
- Full Text :
- https://doi.org/10.1145/996943.996948