The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Ataques convencionais de recuperação de chave eficientes contra Wired Equivalent Privacy (WEP) exigem vetores de inicialização específicos ou pacotes específicos. Como leva muito tempo para coletar os pacotes o suficiente, qualquer ataque ativo deve ser executado. Um Sistema de Detecção de Intrusão (IDS), entretanto, será capaz de impedir o ataque. Como os logs de ataque são armazenados nos servidores, é possível prevenir tal ataque. Este artigo propõe um algoritmo para recuperar uma chave WEP de 104 bits de qualquer pacote IP em um ambiente realista. Este ataque precisa de cerca de 36,500 pacotes com probabilidade de sucesso de 0.5, e a complexidade do nosso ataque é equivalente a cerca de 220 cálculos das configurações da chave RC4. Como nosso ataque é passivo, é difícil para usuários e administradores WEP detectar nosso ataque.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Ryoichi TERAMURA, Yasuo ASAKURA, Toshihiro OHIGASHI, Hidenori KUWAKADO, Masakatu MORII, "Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets" in IEICE TRANSACTIONS on Fundamentals,
vol. E93-A, no. 1, pp. 164-171, January 2010, doi: 10.1587/transfun.E93.A.164.
Abstract: Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36,500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E93.A.164/_p
Copiar
@ARTICLE{e93-a_1_164,
author={Ryoichi TERAMURA, Yasuo ASAKURA, Toshihiro OHIGASHI, Hidenori KUWAKADO, Masakatu MORII, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets},
year={2010},
volume={E93-A},
number={1},
pages={164-171},
abstract={Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36,500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.},
keywords={},
doi={10.1587/transfun.E93.A.164},
ISSN={1745-1337},
month={January},}
Copiar
TY - JOUR
TI - Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 164
EP - 171
AU - Ryoichi TERAMURA
AU - Yasuo ASAKURA
AU - Toshihiro OHIGASHI
AU - Hidenori KUWAKADO
AU - Masakatu MORII
PY - 2010
DO - 10.1587/transfun.E93.A.164
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E93-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2010
AB - Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36,500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.
ER -