Why You Should Not Trust Wired Equivalent Privacy (WEP)

Download Now Free registration required

Executive Summary

The Wired Equivalent Privacy (WEP) protocol is included in the 802.11 standard. This standard concern wireless networks, and WEP is a protocol used to protect communications from eavesdropping and other attacks. WEP uses the RC4 algorithm to encrypt data. The weakness of WEP is due to the fact that RC4 transmits packets including the encryption key (IV packets). This paper explains why WEP is an insecure security protocol, and the paper provides a concrete example showing that it takes only a few minutes to break a WEP key. To break the WEP key, the paper uses a tool called Aircrack which implements the Fluhrer, Mantin, and Shamir attack.

  • Format: PDF
  • Size: 536.6 KB