Limitations Of Wired Equivalent Privacy

2704 Words11 Pages
Limitations of Wired Equivalent Privacy Presented in IAAS670 Wireless and Mobile Security By Joel Bramblett, Oluwaseun Onibudo, and Michelle Rowton Davenport University October 21, 2014 Nasser Halwani Professor Abstract The Wired Equivalent Privacy algorithm (WEP) is a method of securing IEEE 802.11 wireless internet connections. This algorithm was accepted by the IEEE (The Institute of Electrical and Electronics Engineers) in 1999 and it was subsequently used as the standard for wireless security JATIT (2012). Just over 5 years after its ratification by IEEE, the same body phased it out after some FBI personnel demonstrated how easy it was to crack (in as little as three minutes) (Cheung, 2005). This marked the entry of WPA/WPA2 (Wi-Fi Protected Access), but this is not our area of concentration in this paper. This paper opens with an introduction into the world of WEP and proceeds by concentrating on the various vulnerabilities that led to the abandonment of the WEP as a secure protocol for wireless networks. Our discussion will center on WEP limitations regarding initialization vectors and the method of encryption –RC4 vis-à-vis the probable fixes for the vulnerabilities. We will conclude by looking at the full WEP operational picture and possible recommendations for securing wireless networks in this modern age. Table of Contents Introduction 4 How WEP Works 4 Limitations 5 Limitations of the Initialization Vectors 5 Source of Initialization vectors 5 IV

More about Limitations Of Wired Equivalent Privacy

Open Document