Breaking 104 Bit WEP in Less Than 60 Seconds

Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

97 Citations (Scopus)
43 Downloads (Pure)

Abstract

We demonstrate an active attack on the WEP protocol that is able to recover a 104-bit WEP key using less than 40,000 frames with a success probability of 50%. In order to succeed in 95% of all cases, 85,000 packets are needed. The IV of these packets can be randomly chosen. This is an improvement in the number of required frames by more than an order of magnitude over the best known key-recovery attacks for WEP. On a IEEE 802.11g network, the number of frames required can be obtained by re-injection in less than a minute. The required computational effort is approximately 220 RC4 key setups, which on current desktop and laptop CPUs is negligible.
Original languageEnglish
Title of host publicationInformation Security Applications
Subtitle of host publication8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers
EditorsSehun Kim, Moti Yung, Hyung-Woo Lee
Place of PublicationBerlin
PublisherSpringer
Pages188-202
Number of pages15
ISBN (Electronic)978-3-540-77535-5
ISBN (Print)978-3-540-77534-8
DOIs
Publication statusPublished - 2007
Externally publishedYes
Event8th International Workshop on Information Security Applications, WISA 2007 - Jeju Island, Korea, Republic of
Duration: 27 Aug 200729 Aug 2007
Conference number: 8

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume4867
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Workshop

Workshop8th International Workshop on Information Security Applications, WISA 2007
Abbreviated titleWISA
Country/TerritoryKorea, Republic of
CityJeju Island
Period27/08/0729/08/07

Keywords

  • AES
  • Error-correcting Code
  • Signatur
  • Access Control
  • Algorithms
  • Anonymity
  • Authentication
  • Biometrics
  • Block ciphers
  • Cryptanalys
  • Cryptology
  • Data Security
  • Privacy
  • Security

Fingerprint

Dive into the research topics of 'Breaking 104 Bit WEP in Less Than 60 Seconds'. Together they form a unique fingerprint.

Cite this