FMS attack-resistant WEP implementation is still broken

  • Authors:
  • Toshihiro Ohigashi;Yoshiaki Shiraishi;Masakatu Morii

  • Affiliations:
  • The University of Tokushima, Tokushima, Japan;Kinki University, Higashi-Osaka, Japan;Kobe University, Kobe, Japan

  • Venue:
  • CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we present an attack to break WEP that avoids weak IVs used in the FMS attack. Our attack is a known IV attack that doesn’t need the specific pattern of the IVs. This attack transforms most IVs of WEP into weak IVs. If we attempt to avoid all weak IVs used in our attack, the rate at which IVs are avoided is too large to use practical. When using a 128-bit session key, the efficiency of our attack is 272.1 in the most effective case. This implies that our attack can recover a 128-bit session key within realistically possible computational times.