Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Mobile

    The Final Final Nail in WEPs Coffin?

    Written by

    Lisa Vaas
    Published April 5, 2007
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Researchers have discovered a new way of attacking Wired Equivalent Privacy that requires an amount of data “more than an order of magnitude” less than the best known key-recovery attacks. In effect, the cracking can be done within a minute, as the title of the paper suggests: Breaking 104 bit WEP in less than 60 seconds.

      Specifically, only 40,000 data packets are needed for a 50 percent chance of success, while 85,000 packets give a 95 percent chance of success, according to the papers authors: Erik Tews, Ralf-Philipp Weinmann and Andrei Pyshkin, all researchers in the computer science department at Darmstadt University of Technology in Darmstadt, Germany.

      The ease of cracking WEP is nothing new; cryptanalysts showed six years ago that any WEP key can be cracked with readily available software in one minute or less. The protocol, which is part of the IEEE 802.11 wireless networking standard, was superseded by WPA (Wi-Fi Protected Access) in 2003, then by WPA2, another name for the full IEEE 802.11i standard.

      Whats new that has been missing from WEP cracking until now is that a Wi-Fi attacker no longer needs long periods of time nor much smarts, according to Wi-Fi security experts.

      “…To crack WEP [up until now] it 1) required a knowledgeable attacker [and] 2) took a long time,” said Andrea Bittau, in an e-mail exchange. Bittau is a research fellow at the University College London and a co-author of a paper describing what had been the most effective WEP cracking technique prior to the Germans research.

      “In the past, the wait time could have been hours, whereas now, it seems to be only a few minutes,” Battau said. “Thus, WEP cracking has finally made it into the general public at a reasonable cost [only a few minutes].”

      Thanks to this new discovery, we can expect the arrival of tools that can break WEP in 10 minutes or less by pressing a single button, Battau said. In other words, tools that can allow for walk-through hackings, whether in Wi-Fi-networked conference rooms or in the local coffee shop.

      /zimages/4/28571.gifAnalysts speak out on wireless security hype. Click here to read more.

      Battaus Web cracking paper, published with Mark Handley of University College London and Netgears Joshua Lackey, was titled “The Final Nail in WEPs Coffin.”

      When published in May 2005, the paper presented a breakthrough in WEP cracking: a novel vulnerability that allows an attacker to send arbitrary data on a WEP network after having eavesdropped only a single data packet, along with techniques for real-time decryption of data packets that can be used under common circumstances.

      If that “final nail” wasnt the final nail, will this new research be the one that really puts WEP into its grave?

      David Wagner, co-author of a paper on the insecurity of 802.11, said hed like to think its the last nail for WEP, but were probably not going to see the end of it soon.

      Next Page: WEP is everywhere despite warnings.

      WEP Is Everywhere Despite


      Warnings”>

      “Ironically, last May, when Bittau, Handley and Lackey released their research showing new flaws in WEP, I remember calling that the final nail in the coffin and the end of the road for WEP,” he said in an e-mail exchange. “But it seems that no matter how bad we think WEP is, the news can always be worse than we imagined.”

      And still, WEP enjoys wide deployment.

      In Battaus May 2006 paper, the researchers detail their survey of 400 wireless networks in London and 2,539 networks in the Seattle area. Although more secure protocols exist—WPA and 802.11i—the researchers found that few networks use them.

      “In both cases, about half of the networks used encryption,” according to the paper. “In London, 76 percent of the encrypted networks in our sample used WEP, and in Seattle 85 percent of them used WEP. Although vendors recommend upgrading to WPA or 802.11i, only a minority of users seem to use these solutions.”

      But as Wi-Fi networking equipment vendors will tell you, theres no way to walk away from WEP with all the legacy laptops and network cards still around that use the encryption scheme.

      Som Pal Choudhury, Netgears product line manager, advanced wireless, said in an interview that, like many, WPA and WPA2 are default encryption schemes in the companys routers and that Netgears reference and setup manuals all explain the dangers of WEP.

      In fact, the Wi-Fi Alliance as of March 2006 mandated WPA2 for all new devices in order to be Wi-Fi Alliance certified.

      Still, Pal Choudhury said, there are “Legacy drivers, legacy devices out there … you buy a laptop for three to five years. If you bought in 2002, 2003, it used to only support WEP. Now, with the second generation of laptops youre going to buy, these are all going to be WPA, WPA2.”

      /zimages/4/28571.gifClick here to read about how security threats loom as wireless blooms.

      In the meantime, Wi-Fi security experts agree that the new WEP cracking techniques should be a wake-up call for equipment manufacturers to make defaults more secure and to make the security features easier to use.

      “Perhaps this will lead people to totally abandon WEP and switch to something else,” Battau said. “Frankly, however, I think that WEP will still be around for a while due to ignorance. It has received much publicity in academic papers, but there was no response. We will now see what the response will be when a one-click tool for breaking WEP in 10 minutes becomes available.”

      A one-button WEP-breaking tool would certainly get Wi-Fi users attention and thus hasten WEPs demise. Wi-Fi security experts have the Germans to thank for that. After all, Battau said, “Yes, [the Germans research] was the missing nail.”

      Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEKs Security Watch blog.

      Lisa Vaas
      Lisa Vaas
      Lisa Vaas is News Editor/Operations for eWEEK.com and also serves as editor of the Database topic center. She has focused on customer relationship management technology, IT salaries and careers, effects of the H1-B visa on the technology workforce, wireless technology, security, and, most recently, databases and the technologies that touch upon them. Her articles have appeared in eWEEK's print edition, on eWEEK.com, and in the startup IT magazine PC Connection.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×