Wired Equivalent Privacy Weaknesses
Wired Equivalent Privacy (WEP), the built-in security mechanism of 802.11b, has some known flaws in the encryption algorithms used to secure its transmissions. The details about these flaws can be found at the following locations:
Security of the WEP algorithm (http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html)
Using the Fluhrer, Mantin, and Shamir attack to break WEP (http://www.cs.rice.edu/~astubble/wep/wep_attack.html)
The flaws described in the papers referenced show the following:
Statistical analysis can be performed as a passive attack to decrypt traffic.
Based on known plain text, new traffic can be entered from unauthorized wireless clients.
After capturing data and traffic, a dictionary attack can ...
Get Privacy Defended: Protecting Yourself Online now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.