scispace - formally typeset

Wired Equivalent Privacy

About: Wired Equivalent Privacy is a(n) research topic. Over the lifetime, 288 publication(s) have been published within this topic receiving 6748 citation(s). The topic is also known as: WEP & Wireless Encryption Protocol. more


Open accessBook ChapterDOI: 10.1007/3-540-45537-X_1
Scott R. Fluhrer1, Itsik Mantin2, Adi Shamir2Institutions (2)
16 Aug 2001-
Abstract: In this paper we present several weaknesses in the key scheduling algorithm of RC4, and describe their cryptanalytic significance. We identify a large number of weak keys, in which knowledge of a small number of key bits suffices to determine many state and output bits with non-negligible probability. We use these weak keys to construct new distinguishers for RC4, and to mount related key attacks with practical complexities. Finally, we show that RC4 is completely insecure in a common mode of operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802.11 standard), in which a fixed secret key is concatenated with known IV modifiers in order to encrypt different messages. Our new passive ciphertext-only attack on this mode can recover an arbitrarily long key in a negligible amount of time which grows only linearly with its size, both for 24 and 128 bit IV modifiers. more

Topics: Key generation (67%), Weak key (66%), Key distribution (63%) more

1,105 Citations

Proceedings ArticleDOI: 10.1145/381677.381695
Nikita Borisov1, Ian Goldberg2, David Wagner1Institutions (2)
16 Jul 2001-
Abstract: The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, used to protect link-layer communications from eavesdropping and other attacks. We have discovered several serious security flaws in the protocol, stemming from mis-application of cryptographic primitives. The flaws lead to a number of practical attacks that demonstrate that WEP fails to achieve its security goals. In this paper, we discuss in detail each of the flaws, the underlying security principle violations, and the ensuing attacks. more

985 Citations

Open accessBook
01 Apr 2002-
Abstract: From the Publisher: As a network administrator, architect, or security professional, you need to understand the capabilities, limitations, and risks associated with integrating wireless LAN technology into your current infrastructure 80211 Wireless Networks: The Definitive Guide provides all the information necessary to analyze and deploy wireless networks with confidence Over the past five years, the world has become increasingly mobile Traditional ways of networking have altered to accommodate new lifestyles and ways of working Wireless networks offer several advantages over fixed (or “wired”) networks, with mobility, flexibility, ease and speed of deployment, and low-cost at the top of the list Large productivity gains are possible when developers, students, and professionals are able to access data on the move Ad-hoc meetings in the lunch room, library, or across the street in the cafe allow you to develop ideas collaboratively and act on them right away Wireless networks are typically very flexible, which can translate into rapid deployment Once the infrastructure is in place, adding new users is just a matter of authorization After a general introduction to wireless networks, this practical book moves quickly into the gory details of the 80211 standard If you ever need to debug a wireless network that isn't working properly, you'd better understand this material 80211 MAC (Media Access Control), detailed 80211 framing, WEP (Wired Equivalent Privacy protocol), 8021x, management operations, and the PCF (point coordination function) are all covered in detail Author Matthew Gast also supplies impressive detail on the physical layers As for getting awireless network up and running, Gast offers clear, no-nonsense guide for using 80211 on Windows and Linux, using and selecting access points, making deployment considerations, and seeing to 80211 network monitoring and performance tuning In the final section of the book, he summarizes the standardization work pending in the 80211 working group If you're looking for one book that provides a full spectrum view of 80211, from the minute details of the specification, to deployment, monitoring, and troubleshooting, 80211 Wireless Networks: The Definitive Guide is worth its weight in gold more

765 Citations

Open accessProceedings Article
01 Jan 2002-
Abstract: We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our implementation, and permission of the network administrator, we were able to recover the 128 bit secret key used in a production network, with a passive attack. The WEP standard uses RC4 IVs improperly, and the attack exploits this design failure. This paper describes the attack, how we implemented it, and some optimizations to make the attack more efficient. We conclude that 802.11 WEP is totally insecure, and we provide some recommendations. more

Topics: Fluhrer, Mantin and Shamir attack (72%), RC4 (64%), Temporal Key Integrity Protocol (61%) more

376 Citations

Open accessProceedings ArticleDOI: 10.1145/1514274.1514286
Erik Tews1, Martin Beck2Institutions (2)
16 Mar 2009-
Abstract: In this paper, we describe two attacks on IEEE 802.11 based wireless LANs. The first attack is an improved key recovery attack on WEP, which reduces the average number of packets an attacker has to intercept to recover the secret key. The second attack is (according to our knowledge) the first practical attack on WPA secured wireless networks, besides launching a dictionary attack when a weak pre-shared key (PSK) is used. The attack works if the network is using TKIP to encrypt the traffic. An attacker, who has about 12-15 minutes access to the network is then able to decrypt an ARP request or response and send 7 packets with custom content to network. more

209 Citations

No. of papers in the topic in previous years

Top Attributes

Show by:

Topic's top 5 most impactful authors

Mohammed Boulmalf

4 papers, 80 citations

Ezedin Barka

4 papers, 80 citations

K. M. Sunjiv Soyjaudah

3 papers, 4 citations

Andrea Bittau

2 papers, 210 citations

Ahmad Mohammad Mohammad Kholaif

2 papers, 1 citations

Network Information
Related Topics (5)
Symmetric-key algorithm

6.3K papers, 113.5K citations

75% related
Wireless WAN

20K papers, 467.3K citations

73% related

11.9K papers, 194.3K citations

73% related

37.3K papers, 854.5K citations

72% related
Denial-of-service attack

10.2K papers, 157.8K citations

72% related