[CLUE-Tech] WEP security?

David Anselmi anselmi at americanisp.net
Tue Nov 19 07:37:58 MST 2002


Tom Poindexter wrote:
[...]
> 
> 40-bit WEP can probably be cracked in under 30 seconds for most cases, where
> WEP keys are choosen from ASCII characters.  Using ASCII keys are easy to
> type, but essentially reduces the key space from 40 bits to about 21 bits.
> A full brute force on 40 bits might take several weeks, but due to other
> problems in WEP (weak keys, etc.) that time is probably a matter of days.
> 
> 104 bit WEP is harder to brute force, but taking advantage of WEP 
> problems and a small cluster of machines, a week should be considered the
> time to break a 104 bit WEP key.

Brute force is unnecessary for WEP.  There is a flaw in the crypto that 
allows breaking the key regardless of length.  All that's required is to 
sniff 5-6M packets which takes "several hours on a moderately loaded 
network".  Sean's message had a link to the paper.

So WEP is in the same category as cleartext passwords.  It adds a little 
difficulty to cracking, but won't stop anyone serious.

It would be interesting to see a howto or have a talk on setting up a 
VPN to prevent unauthorized use of a wireless LAN.

Dave




More information about the clue-tech mailing list