Description: WEP (Wired Equivalent Privacy) is the only encryption standard supported in IEEE 802.11-1999 (commonly known as Wi Fi) standard. Being broadcast medium wireless medium is highly susceptible to eavesdropping. WEP was intended to provide the required confidentiality. But starting early 2001, many serious cryptographic vulnerabilities were discovered with WEP protocol. Those vulnerabilities were so strong that IEEE had to deprecate the WEP standard. <p>When WEP is active in a wireless LAN, each 802.11 packet is encrypted separately with an RC4 cipher stream generated by a 64 bit RC4 key. This key is composed of a 24 bit initialization vector (IV) and a 40 bit WEP key. The encrypted packet is generated with a bitwise exclusive OR (XOR) of the original packet and the RC4 stream. The IV is chosen by the sender and should be changed so that every packet won't be encrypted with the same cipher stream. The IV is sent in the clear with each packet. An additional 4 byte Integrity Check Value (ICV) is computed on the original packet using the CRC-32 checksum algorithm and appended to the end. </p> <p>The WEP tutorial #1 covers the basic working of WEP protocol. Tutorial #2 talks about the flaws in the WEP protocol and explains few very important flaws. This video talks about the remaining flaws with WEP as a protocol. It also talks about the flaws in general and gives the overview of the tools available on the new which can help in cracking the WEP key. </p> <p>The flaws discussed in this video include,
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.