Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)

Adam Stubblefield, John Ioannidis, Aviel D. Rubin
2004 ACM Transactions on Privacy and Security  
In this paper, we present a practical key recovery attack on WEP, the link-layer security protocol for 802.11b wireless networks. The attack is based on a partial key exposure vulnerability in the RC4 stream cipher discovered by Fluhrer, Mantin, and Shamir. This paper describes how to apply this flaw to breaking WEP, our implementation of the attack, and optimizations that can be used to reduce the number of packets required for the attack. We conclude that the 802.11b WEP standard is
more » ... insecure, and we provide recommendations on how this vulnerability could be mitigated and repaired.
doi:10.1145/996943.996948 fatcat:3fqo2ogqpzfj7c2c75bmjwc3lu