A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)

  • Authors:
  • Adam Stubblefield;John Ioannidis;Aviel D. Rubin

  • Affiliations:
  • Johns Hopkins University, Baltimore, MD;AT&T Labs--Research;Johns Hopkins University, Baltimore, MD

  • Venue:
  • ACM Transactions on Information and System Security (TISSEC)
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we present a practical key recovery attack on WEP, the link-layer security protocol for 802.11b wireless networks. The attack is based on a partial key exposure vulnerability in the RC4 stream cipher discovered by Fluhrer, Mantin, and Shamir. This paper describes how to apply this flaw to breaking WEP, our implementation of the attack, and optimizations that can be used to reduce the number of packets required for the attack. We conclude that the 802.11b WEP standard is completely insecure, and we provide recommendations on how this vulnerability could be mitigated and repaired.