16 December 2014 Analysis of selected methods for the recovery of encrypted WEP key
Author Affiliations +
Proceedings Volume 9290, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2014; 92902Z (2014) https://doi.org/10.1117/12.2075251
Event: Symposium on Photonics Applications in Astronomy, Communications, Industry and High-Energy Physics Experiments, 2014, Warsaw, Poland
Abstract
This paper deals with some of the WEP (Wired Equivalent Privacy) key decryption methods based on aircrack-ng software, which was embedded in Backtrack operating system (Linux distribution). The 64-bit (40-bit) and 128-bit (104- bit) key encrypted with RC4 cipher weakness was shown. Research methods were made in different network environments. In this work we compared different types of keys to check how strong the RC4 stream cipher can be. The 40-bit and 104-bit WEP key has been tested on IEEE 802.11 based wireless LAN using laptop with live-CD Linux operating system. A short analysis of key creation methods was performed to compare the amount of time necessary to decrypt random and nonrandom WEP keys.
© (2014) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Sebastian Wójtowicz, Sebastian Wójtowicz, Radosław Belka, Radosław Belka, "Analysis of selected methods for the recovery of encrypted WEP key", Proc. SPIE 9290, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2014, 92902Z (16 December 2014); doi: 10.1117/12.2075251; https://doi.org/10.1117/12.2075251
PROCEEDINGS
7 PAGES


SHARE
RELATED CONTENT

Network systems security analysis
Proceedings of SPIE (May 13 2015)
Protecting sensitive data: lessons learned
Proceedings of SPIE (March 11 1996)
The study of wlan security and its solution
Proceedings of SPIE (February 19 2006)
Multidomain operations science and technology
Proceedings of SPIE (August 12 2004)
Analysis and solutions of security issues in Ethernet PON
Proceedings of SPIE (February 07 2005)

Back to Top