[Resource Topic] 2007/120: Breaking 104 bit WEP in less than 60 seconds

Welcome to the resource topic for 2007/120

Title:
Breaking 104 bit WEP in less than 60 seconds

Authors: Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin

Abstract:

We demonstrate an active attack on the WEP protocol that is able to recover a 104-bit WEP key using less than 40.000 frames in 50% of all cases. The IV of these packets can be randomly chosen. This is an improvement in the number of required frames by more than an order of magnitude over the best known key-recovery attacks for WEP. On a IEEE 802.11g network, the number of frames required can be obtained by re-injection in less than a minute. The required computational effort is approximately 2^{20} RC4 key setups, which on current desktop and laptop CPUs is neglegible.

ePrint: https://eprint.iacr.org/2007/120

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .