Wireless networks security: Proof of chopchop attack

  • Authors:
  • Mouhcine Guennoun;Aboubakr Lbekkouri;Amine Benamrane;Mohamed Ben-Tahir;Khalil El-Khatib

  • Affiliations:
  • Département Math-Info, Faculté des Sciences de Rabat4 Avenue Ibn Battouta, B.P. 1014 RP, Rabat, Maroc, Morocco;Département Math-Info, Faculté des Sciences de Rabat4 Avenue Ibn Battouta, B.P. 1014 RP, Rabat, Maroc, Morocco;Département Math-Info, Faculté des Sciences de Rabat4 Avenue Ibn Battouta, B.P. 1014 RP, Rabat, Maroc, Morocco;Département Math-Info, Faculté des Sciences de Rabat4 Avenue Ibn Battouta, B.P. 1014 RP, Rabat, Maroc, Morocco;University of Ontario Institute of Technology, 2000 Simcoe Street North, Oshawa, Canada L1H 7K4

  • Venue:
  • WOWMOM '08 Proceedings of the 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

An encryption protocol is the first line of defense against network attacks. The Wired Equivalent Privacy (WEP), used to secure 802.11 based networks, suffers from many weaknesses that were exploited in order to compromise the security of the network, data confidentiality and integrity. An attack named ChopChop can decrypt the content of a frame without knowing the encryption key. There has been no theoretical proof of the functionality of the attack. In this paper, we will give a review of the attack and build a mathematical model to prove theoretically that the attack is capable of decrypting messages in WEP enabled wireless networks without requiring the knowledge of the encryption key.