Cracking 104 bit WEP (Wired Equivalent Privacy) itself is old news. However new *cracking speed* is mind blowing.
According to new research it takes less than one minute to break a common 802.11 104-bit WEP encryption:
WEP is a protocol for securing wireless LAN. WEP therefore uses the RC4 stream to encrypt data which is transmitted over the air, using usually a single secret key (called the root key or WEP key) of a length of 40 or 104 bit.
We were able to extend Klein's attack and optimize it for usage against WEP. Using our version, it is possible to recover a 104 bit WEP key with probability 50% using just 40,000 captured packets. For 60,000 available data packets, the success probability is about 80% and for 85,000 data packets about 95%. Using active techniques like deauth and ARP re-injection, 40,000 packets can be captured in less than one minute under good condition. The actual computation takes about 3 seconds and 3 MB main memory on a Pentium-M 1.7 GHz and can additionally be optimized for devices with slower CPUs. The same attack can be used for 40 bit keys too with an even higher success probability.
Currently at home I’m using WPA2 personal. However, at work place we have disabled wireless access a year ago (except cafeteria area).
A paper (PDF) describing the details and methods we used in our attack is available on the IACR ePrint server. A proof-of-concept of attack in a tool called aircrack-ptw (source) is available. It should be used together with the aircrack-ng toolsuite.
How do I avoid this kind of problems?
You can switch to WPA2 to avoid this attack :) Make sure support for WPA2 is available through your Linux driver as well as the userspace utility called wpa_supplicant.
You can also use a Linux GUI tool called NetworkManager to configure access to protected wireless networks.TwitterFacebookGoogle+PDF versionFound an error/typo on this page? Help us!
- 30 Cool Open Source Software I Discovered in 2013
- 30 Handy Bash Shell Aliases For Linux / Unix / Mac OS X
- Top 30 Nmap Command Examples For Sys/Network Admins
- 25 PHP Security Best Practices For Sys Admins
- 20 Linux System Monitoring Tools Every SysAdmin Should Know
- 20 Linux Server Hardening Security Tips
- Linux: 20 Iptables Examples For New SysAdmins
- Top 20 OpenSSH Server Best Security Practices
- Top 20 Nginx WebServer Best Security Practices
- 20 Examples: Make Sure Unix / Linux Configuration Files Are Free From Syntax Errors
- 15 Greatest Open Source Terminal Applications Of 2012
- My 10 UNIX Command Line Mistakes
- Top 10 Open Source Web-Based Project Management Software
- Top 5 Email Client For Linux, Mac OS X, and Windows Users
- The Novice Guide To Buying A Linux Laptop