Fast WEP-key recovery attack using only encrypted IP packets

9Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36,500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack. © 2010 The Institute of Electronics, Information and Communication Engineers.

Cite

CITATION STYLE

APA

Teramura, R., Asakura, Y., Ohigashi, T., Kuwakado, H., & Morii, M. (2010). Fast WEP-key recovery attack using only encrypted IP packets. In IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (Vol. E93-A, pp. 164–171). Institute of Electronics, Information and Communication, Engineers, IEICE. https://doi.org/10.1587/transfun.E93.A.164

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free