Smashing WEP in a Passive Attack

  • Pouyan Sepehrdad
  • Petr Sušil
  • Serge Vaudenay
  • Martin Vuagnoux
Conference paper

DOI: 10.1007/978-3-662-43933-3_9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8424)
Cite this paper as:
Sepehrdad P., Sušil P., Vaudenay S., Vuagnoux M. (2014) Smashing WEP in a Passive Attack. In: Moriai S. (eds) Fast Software Encryption. FSE 2013. Lecture Notes in Computer Science, vol 8424. Springer, Berlin, Heidelberg

Abstract

In this paper, we report extremely fast and optimised active and passive attacks against the old IEEE 802.11 wireless communication protocol WEP. This was achieved through a huge amount of theoretical and experimental analysis (capturing WiFi packets), refinement and optimisation of all the former known attacks and methodologies against RC4 stream cipher in WEP mode. We support all our claims by providing an implementation of this attack as a publicly available patch on Aircrack-ng. Our new attacks improve its success probability drastically. We adapt our theoretical analysis in Eurocrypt 2011 to real-world scenarios and we perform a slight adjustment to match the empirical observations. Our active attack, based on ARP injection, requires \(22\,500\) packets to gain success probability of \(50\,\%\) against a \(104\)-bit WEP key, using Aircrack-ng in non-interactive mode. It runs in less than \(5\) s on an off-the-shelf PC. Using the same number of packets, Aicrack-ng yields around \(3\,\%\) success rate. Furthermore, we describe very fast passive only attacks by just eavesdropping TCP/IPv4 packets in a WiFi communication. Our passive attack requires \(27\,500\) packets. This is much less than the number of packets Aircrack-ng requires in active mode (around \(37\,500\)), which is a huge improvement. We believe that our analysis brings on further insight to the security of RC4.

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Pouyan Sepehrdad
    • 1
  • Petr Sušil
    • 2
  • Serge Vaudenay
    • 2
  • Martin Vuagnoux
    • 3
  1. 1.Intel CRI-SC at TU-DarmstadtDarmstadtGermany
  2. 2.EPFLLausanneSwitzerland
  3. 3.base23 SAGenevaSwitzerland

Personalised recommendations