Practical attacks against WEP and WPA

@inproceedings{Tews2009PracticalAA,
  title={Practical attacks against WEP and WPA},
  author={Erik Tews and Martin Beck},
  booktitle={WiSec '09},
  year={2009}
}
  • Erik Tews, Martin Beck
  • Published in WiSec '09 2009
  • Computer Science
  • In this paper, we describe two attacks on IEEE 802.11 based wireless LANs. The first attack is an improved key recovery attack on WEP, which reduces the average number of packets an attacker has to intercept to recover the secret key. The second attack is (according to our knowledge) the first practical attack on WPA secured wireless networks, besides launching a dictionary attack when a weak pre-shared key (PSK) is used. The attack works if the network is using TKIP to encrypt the traffic. An… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 201 CITATIONS

    A Security Analysis of the WPA-TKIP and TLS Security Protocols

    VIEW 11 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Malware injection in wireless networks

    VIEW 4 EXCERPTS
    CITES METHODS
    HIGHLY INFLUENCED

    Practical verification of WPA-TKIP vulnerabilities

    VIEW 21 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    Attacks against the WiFi protocols

    VIEW 4 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Cross-Site Request Forgery Attacks Against Linksys Wireless Routers

    VIEW 22 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Practical Side-Channel Attacks against WPA-TKIP

    VIEW 10 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Design and Implementation of Secure Stream Cipher Algorithm

    VIEW 3 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Your WiFi is leaking: What do your mobile apps gossip about you?

    VIEW 4 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    FILTER CITATIONS BY YEAR

    2008
    2020

    CITATION STATISTICS

    • 31 Highly Influenced Citations

    • Averaged 15 Citations per year from 2017 through 2019

    References

    Publications referenced by this paper.
    SHOWING 1-5 OF 5 REFERENCES

    Passive-Only Key Recovery Attacks on RC4

    VIEW 9 EXCERPTS
    HIGHLY INFLUENTIAL

    The final nail in WEP's coffin

    VIEW 9 EXCERPTS
    HIGHLY INFLUENTIAL