A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)

@article{Stubblefield2004AKR,
  title={A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)},
  author={Adam Stubblefield and John Ioannidis and Aviel D. Rubin},
  journal={ACM Trans. Inf. Syst. Secur.},
  year={2004},
  volume={7},
  pages={319-332}
}
In this paper, we present a practical key recovery attack on WEP, the link-layer security protocol for 802.11b wireless networks. The attack is based on a partial key exposure vulnerability in the RC4 stream cipher discovered by Fluhrer, Mantin, and Shamir. This paper describes how to apply this flaw to breaking WEP, our implementation of the attack, and optimizations that can be used to reduce the number of packets required for the attack. We conclude that the 802.11b WEP standard is… CONTINUE READING
Highly Cited
This paper has 91 citations. REVIEW CITATIONS
65 Citations
1 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 65 extracted citations

91 Citations

051015'06'09'12'15'18
Citations per Year
Semantic Scholar estimates that this publication has 91 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.

An inductive chosen plaintext attack against wep/wep2

  • W. A. ARBAUGH
  • IEEE Document
  • 2001
Highly Influential
3 Excerpts

Similar Papers

Loading similar papers…