The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over-the-air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The FMS attack can basically be prevented by skipping IVs (Initial Values) used in the attack, but naive skip methods reveal information on the WEP key since most of them depend on the WEP key and the patterns of the skipped IV reveal it. In order to skip IVs safely, the skip patterns must be chosen carefully. In this paper, we review the attack conditions (6) and (7), whose success probability is the highest, 0.05, amongst all known conditions to guess one key-byte from one packet. Then we identify their safe skip patterns.
RC4, WEP, IEEE802.11, WLAN, FMS attack
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Kazukuni KOBARA, Hideki IMAI, "IVs to Skip for Immunizing WEP against FMS Attack" in IEICE TRANSACTIONS on Communications,
vol. E91-B, no. 1, pp. 164-171, January 2008, doi: 10.1093/ietcom/e91-b.1.164.
Abstract: The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over-the-air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The FMS attack can basically be prevented by skipping IVs (Initial Values) used in the attack, but naive skip methods reveal information on the WEP key since most of them depend on the WEP key and the patterns of the skipped IV reveal it. In order to skip IVs safely, the skip patterns must be chosen carefully. In this paper, we review the attack conditions (6) and (7), whose success probability is the highest, 0.05, amongst all known conditions to guess one key-byte from one packet. Then we identify their safe skip patterns.
URL: https://globals.ieice.org/en_transactions/communications/10.1093/ietcom/e91-b.1.164/_p
Copy
@ARTICLE{e91-b_1_164,
author={Kazukuni KOBARA, Hideki IMAI, },
journal={IEICE TRANSACTIONS on Communications},
title={IVs to Skip for Immunizing WEP against FMS Attack},
year={2008},
volume={E91-B},
number={1},
pages={164-171},
abstract={The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over-the-air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The FMS attack can basically be prevented by skipping IVs (Initial Values) used in the attack, but naive skip methods reveal information on the WEP key since most of them depend on the WEP key and the patterns of the skipped IV reveal it. In order to skip IVs safely, the skip patterns must be chosen carefully. In this paper, we review the attack conditions (6) and (7), whose success probability is the highest, 0.05, amongst all known conditions to guess one key-byte from one packet. Then we identify their safe skip patterns.},
keywords={},
doi={10.1093/ietcom/e91-b.1.164},
ISSN={1745-1345},
month={January},}
Copy
TY - JOUR
TI - IVs to Skip for Immunizing WEP against FMS Attack
T2 - IEICE TRANSACTIONS on Communications
SP - 164
EP - 171
AU - Kazukuni KOBARA
AU - Hideki IMAI
PY - 2008
DO - 10.1093/ietcom/e91-b.1.164
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E91-B
IS - 1
JA - IEICE TRANSACTIONS on Communications
Y1 - January 2008
AB - The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over-the-air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The FMS attack can basically be prevented by skipping IVs (Initial Values) used in the attack, but naive skip methods reveal information on the WEP key since most of them depend on the WEP key and the patterns of the skipped IV reveal it. In order to skip IVs safely, the skip patterns must be chosen carefully. In this paper, we review the attack conditions (6) and (7), whose success probability is the highest, 0.05, amongst all known conditions to guess one key-byte from one packet. Then we identify their safe skip patterns.
ER -