Limitations Of Wired Equivalent Privacy

2704 Words Oct 18th, 2014 11 Pages
Limitations of Wired Equivalent Privacy
Presented in
IAAS670 Wireless and Mobile Security By

Joel Bramblett, Oluwaseun Onibudo, and Michelle Rowton
Davenport University
October 21, 2014

Nasser Halwani

The Wired Equivalent Privacy algorithm (WEP) is a method of securing IEEE 802.11 wireless internet connections. This algorithm was accepted by the IEEE (The Institute of Electrical and Electronics Engineers) in 1999 and it was subsequently used as the standard for wireless security JATIT (2012). Just over 5 years after its ratification by IEEE, the same body phased it out after some FBI personnel demonstrated how easy it was to crack (in as little as three minutes) (Cheung, 2005).
This marked the entry of WPA/WPA2 (Wi-Fi Protected Access), but this is not our area of concentration in this paper. This paper opens with an introduction into the world of WEP and proceeds by concentrating on the various vulnerabilities that led to the abandonment of the WEP as a secure protocol for wireless networks. Our discussion will center on WEP limitations regarding initialization vectors and the method of encryption –RC4 vis-à-vis the probable fixes for the vulnerabilities. We will conclude by looking at the full WEP operational picture and possible recommendations for securing wireless networks in this modern age. Table of Contents
Introduction 4
How WEP Works 4
Limitations 5
Limitations of the Initialization Vectors 5
Source of Initialization vectors 5
Open Document