Description: WEP (Wired Equivalent Privacy) is the only encryption standard supported in IEEE 802.11-1999 (commonly known as Wi Fi) standard. Being broadcast medium wireless medium is highly susceptible to eavesdropping. WEP was intended to provide the required confidentiality. But started early 2001, many serious cryptographic vulnerabilities were discovered with WEP protocol. Those vulnerabilities were so strong that IEEE had to deprecate the WEP standard. <p>The video starts with the WEP history, and mainly talks about the working of WEP protocol. Given the encryption key and the plain text message, how exactly the WEP encryption block encrypts the packets and how its counterpart i.e. decryption block decrypts the packet is the main focus of the video. </p>WEP uses RC4 stream cipher algorithm for confidentiality and CRC-32 checksum for integrity checking (ICV). For calculating the key stream from the static key, the Initializing Vector (IV) and the actual static key are concatenated with each other and are given as input to the RC4 block. RC4 algorithm runs on this seed and gives a key stream as a output. This key stream is XORed with the actual plain text data to get the cipher text data. At the receiver end the same process is performed to get the plain text data from encrypted data. <p>Ideally a different key stream should be generated for every packet, and that’s the very reason of introduction of IV. Different IV combined with key stream generates different key streams, unfortunately IV space is very small. IV comprises of 24 bits or there are 2 power 24 possibilities for IV. In a reasonably bust environment the IV space will be wrapped around in few hours. Giving good chances for the passive listener to decrypt the packets. IV and key sizes are just one flaw, but there exist many more even more serious security flaws with WEP. </p> <p> The next two videos discuss more about those flaws. </p>
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Great Video on WEP