WPA to the Rescue!

In Chapter 3, we discussed some of the vulnerabilities of WEP. Let's refresh our memory.

First, remember that WEP uses a 24-bit IV as part of the seeding material that gets plugged into RC4. IVs should never be repeated, but this happens frequently because the 24-bit IV space gets exhausted after just a few hours in heavy traffic. When an IV is used twice (called an IV collision), WEP is vulnerable to key stream and replay attacks. A key stream attack is based on the fundamental principal that the XOR of two cipher texts equals the XOR of two plain texts. A replay attack takes a known key stream and uses it to forge a new packet. Replay attacks are possible because out-of-sequence IVs are accepted under WEP.

Another major issue ...

Get How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.