[IRR] Using the Fluhrer, Mantin, and Shamir Attack to Break WEP

Monty Solomon monty at roscom.com
Tue Aug 7 05:37:05 PDT 2001


Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
AT&T Labs Technical Report TD-4ZCPZZ

Authors
Adam Stubblefield
John Ioannidis
Aviel D. Rubin

Abstract
We implemented an attack against WEP, the link-layer security
protocol for 802.11 networks. The attack was described in a recent
paper by Fluhrer, Mantin, and Shamir. With our implementation, and
permission of the network administrator, we were able to recover the
secret key used in a production network, with a passive attack. The
WEP standard uses RC4 IVs improperly, and the attack exploits this
design failure. This paper describes the attack, how we implemented
it, and some optimizations to make the attack more efficient. We
conclude that 802.11 WEP is totally insecure, and we provide some
recommendations.

http://www.cs.rice.edu/~astubble/wep/

--- end forwarded text


-- 
-----------------
R. A. Hettinga <mailto: rah at ibuc.com>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com





More information about the Testlist mailing list