Presentation is loading. Please wait.

Presentation is loading. Please wait.

Wired Equivalent Privacy (WEP): The first ‘confidentiality’ algorithm for the wireless IEEE 802.11 standard. PRESENTED BY: Samuel Grush and Barry Preston.

Similar presentations


Presentation on theme: "Wired Equivalent Privacy (WEP): The first ‘confidentiality’ algorithm for the wireless IEEE 802.11 standard. PRESENTED BY: Samuel Grush and Barry Preston."— Presentation transcript:

1 Wired Equivalent Privacy (WEP): The first ‘confidentiality’ algorithm for the wireless IEEE 802.11 standard. PRESENTED BY: Samuel Grush and Barry Preston

2 WEP Components 1) Secret Key and Plaintext 2) Initialization Vector (IV) 3) RC4 Stream Cipher 1) Key Scheduling Algorithm (KSA) Seeded by IV+Secret Key Passes 'State' Array to PRGA 2) Pseudo-Random Generation Algorithm (PRGA) Uses 'State' Array to generate a keystream, while also mixing the Array. 4) Plaintext is combined with its checksum. 5) Bitwise-XOR [when encrypting] Plaintext is bitwise-XOR'd with keystream data to generate cyphertext. KSAPRGA Packet ciphertext IV XOR CRC-32 ICV Seed plaintext Secret Key Initialization Vector (IV)

3 WEP Decryption CRC-32 Seed KSA PRGAPacket ciphertext IV Secret Key XOR plaintext Received ICV ≟

4 Key Scheduling Algorithm

5 Pseudo-Random Generation Algorithm

6 Weaknesses The Initialization Vector (IV) 24-bit length limits the IV's entropy to 2² ⁴, or about 16.7 million combinations. ● Certain characters in the 802.11 header are known or can be predicted, leading to a lessened effective entropy. ● The 'Shared Key' authentication system of WEP exposes the beginning of the keystream.


Download ppt "Wired Equivalent Privacy (WEP): The first ‘confidentiality’ algorithm for the wireless IEEE 802.11 standard. PRESENTED BY: Samuel Grush and Barry Preston."

Similar presentations


Ads by Google