Wired Equivalent Privacy: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
No edit summary
imported>Sandy Harris
(typo)
Line 4: Line 4:


A number of serious flaws have been found in the WEP system
A number of serious flaws have been found in the WEP system
<ref{{citation
<ref>{{citation
| title = Security of the WEP algorithm
| title = Security of the WEP algorithm
| author = Nikita Borisov, Ian Goldberg, and David Wagner
| author = Nikita Borisov, Ian Goldberg, and David Wagner

Revision as of 02:44, 8 February 2010

The Wired Equivalent Privacy or WEP protocol was the original encryption system used in IEEE 802.11 wireless networking. It is now deprecated in favour of the newer system WPA, but WEP is still quite widely deployed.

Some argue that the name itself indicates a fundamental design error. Why should a wireless security system be designed for only "wired equivalent" privacy, only as secure as ethernet?

A number of serious flaws have been found in the WEP system [1].

WEP generates keys for different connections by concatenating a connection-specific intialisation value with another secret value, and this creates a vulnerability. It can be broken by a related key attack [2].

References

  1. Nikita Borisov, Ian Goldberg, and David Wagner, Security of the WEP algorithm
  2. Erik Tews, Ralf-Philipp Weinmann and Andrei Pyshkin (2007), Breaking 104 bit WEP in less than 60 seconds