Paper 2007/120

Breaking 104 bit WEP in less than 60 seconds

Erik Tews, Ralf-Philipp Weinmann, and Andrei Pyshkin

Abstract

We demonstrate an active attack on the WEP protocol that is able to recover a 104-bit WEP key using less than 40.000 frames in 50% of all cases. The IV of these packets can be randomly chosen. This is an improvement in the number of required frames by more than an order of magnitude over the best known key-recovery attacks for WEP. On a IEEE 802.11g network, the number of frames required can be obtained by re-injection in less than a minute. The required computational effort is approximately 2^{20} RC4 key setups, which on current desktop and laptop CPUs is neglegible.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
RC4WEPcryptographic protocolscryptanalysis
Contact author(s)
e_tews @ cdc informatik tu-darmstadt de
History
2007-09-16: last of 3 revisions
2007-04-03: received
See all versions
Short URL
https://ia.cr/2007/120
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2007/120,
      author = {Erik Tews and Ralf-Philipp Weinmann and Andrei Pyshkin},
      title = {Breaking 104 bit WEP in less than 60 seconds},
      howpublished = {Cryptology ePrint Archive, Paper 2007/120},
      year = {2007},
      note = {\url{https://eprint.iacr.org/2007/120}},
      url = {https://eprint.iacr.org/2007/120}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.