Paper
16 December 2014 Analysis of selected methods for the recovery of encrypted WEP key
Author Affiliations +
Proceedings Volume 9290, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2014; 92902Z (2014) https://doi.org/10.1117/12.2075251
Event: Symposium on Photonics Applications in Astronomy, Communications, Industry and High-Energy Physics Experiments, 2014, Warsaw, Poland
Abstract
This paper deals with some of the WEP (Wired Equivalent Privacy) key decryption methods based on aircrack-ng software, which was embedded in Backtrack operating system (Linux distribution). The 64-bit (40-bit) and 128-bit (104- bit) key encrypted with RC4 cipher weakness was shown. Research methods were made in different network environments. In this work we compared different types of keys to check how strong the RC4 stream cipher can be. The 40-bit and 104-bit WEP key has been tested on IEEE 802.11 based wireless LAN using laptop with live-CD Linux operating system. A short analysis of key creation methods was performed to compare the amount of time necessary to decrypt random and nonrandom WEP keys.
© (2014) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Sebastian Wójtowicz and Radosław Belka "Analysis of selected methods for the recovery of encrypted WEP key", Proc. SPIE 9290, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2014, 92902Z (16 December 2014); https://doi.org/10.1117/12.2075251
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Operating systems

Computer security

Error control coding

Information security

Aluminum

Local area networks

RELATED CONTENT

Protecting sensitive data: lessons learned
Proceedings of SPIE (March 12 1996)
The study of wlan security and its solution
Proceedings of SPIE (February 20 2006)
Bot armies as threats to network security
Proceedings of SPIE (April 09 2007)
Addressing tomorrow's DMO technical challenges today
Proceedings of SPIE (April 30 2009)

Back to Top