WEP uses the RC4 encryption algorithm, which is known as a streamĬipher. Of traffic, allows real-time automated decryption of all traffic.Īn excerpt from their paper about the technical problems with WEP: Active attack to inject new traffic from unauthorized mobile stations, based on known plaintext.Īctive attacks to decrypt traffic, based on tricking the accessĭictionary-buildingattack that, after analysis of about a day's worth.Passive attacks to decrypt traffic based on statistical analysis.In 2001, 3 researchers working at Berkeley produced a paper named " (In)Security of the WEP algorithm". Unfortunately it was discovered that WEP had some serious flaws. WEP was the first algorithm used to secure wireless access points. ![]() Mostly on consumer wireless access points these are: There are several types of possible encryption. First of all that would entirely depend on the encryption used by the access point.
0 Comments
Leave a Reply. |