FMS Attack-Resistant WEP Implementation Is Still Broken
- 740 Downloads
In this paper, we present an attack to break WEP that avoids weak IVs used in the FMS attack. Our attack is a known IV attack that doesn’t need the specific pattern of the IVs. This attack transforms most IVs of WEP into weak IVs. If we attempt to avoid all weak IVs used in our attack, the rate at which IVs are avoided is too large to use practical. When using a 128-bit session key, the efficiency of our attack is 272.1 in the most effective case. This implies that our attack can recover a 128-bit session key within realistically possible computational times.
Unable to display preview. Download preview PDF.
- 1.IEEE Computer Society. Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11 (1999) (Edition) Google Scholar
- 3.NIST, FIPS PUB 180-2 Secure Hash Standard (August 2002)Google Scholar
- 4.Schneier, B.: Applied Cryptography. Wiley, New York (1996)Google Scholar
- 5.Wi-Fi Alliance, Wi-Fi Protected Access, available at http://www.weca.net/opensection/protected_access.asp