Abstract | ||
---|---|---|
We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our implementation, and permission of the net- work administrator, we were able to recover the 128 bit secret key used in a production network, with a passive attack. The WEP standard uses RC4 IVs improperly, and the attack exploits this design failure. This paper describes the attack, how we implemented it, and some optimizations to make the at- tack more efficient. We conclude that 802.11 WEP is totally insecure, and we provide some recommendations. |
Year | Venue | Field |
---|---|---|
2002 | NDSS | Temporal Key Integrity Protocol,Internet privacy,Cryptographic protocol,Computer security,Computer science,Fluhrer, Mantin and Shamir attack,Computer network,Wi-Fi Protected Access,Network administrator,RC4,Wired Equivalent Privacy,Passive attack |
DocType | Citations | PageRank |
Conference | 115 | 27.58 |
References | Authors | |
6 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Adam Stubblefield | 1 | 726 | 101.64 |
John Ioannidis | 2 | 1431 | 145.33 |
Aviel D. Rubin | 3 | 3330 | 374.32 |