The Lazy Genius

Security News & Brain Dumps from Xavier Ashe, a Bit9 Client Partner

Breaking 104 bit WEP in less than 60 seconds

Posted by Xavier Ashe on April 5, 2007

We demonstrate an active attack on the WEP protocol that is able to
recover a 104-bit WEP key using less than 40.000 frames with a success
probability of 50%. In order to succeed in 95% of all cases, 85.000
packets are needed. The IV of these packets can be randomly chosen.
This is an improvement in the number of required frames by more than an
order of magnitude over the best known key-recovery attacks for WEP. On
a IEEE 802.11g network, the number of frames required can be obtained
by re-injection in less than a minute. The required computational
effort is approximately 2^20 RC4 key setups, which on current desktop
and laptop CPUs in negligible.

Good paper (PDF) from Erik Tews, Ralf-Philipp Weinmann, and Andrei Pyshkin.  It ridiculous how many people still user WEP.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

 
%d bloggers like this: