First page Back Continue Last page Overview Graphics
WEP was the first effort
The Wired Equivalent Privacy (WEP) protocols were the first attempt
Major problems were noted early on, but it was a standard and many had already committed to silicon
As attack sophistication grew another solution had to be found.
http://www.drizzle.com/~aboba/IEEE/
Notes:
Passive attacks to decrypt traffic based on statistical analysis.
Active attack to inject new traffic from unauthorized mobile stations, based on known plaintext attack.
Active attacks to decrypt traffic, based on tricking the access point.
Dictionary-building attack - after analysis of some period's traffic, allows real-time decryption of all traffic.