Description: WEP (Wired Equivalent Privacy) is the only encryption standard supported in IEEE 802.11-1999 (commonly known as Wi Fi) standard. Being broadcast medium wireless medium is highly susceptible to eavesdropping. WEP was intended to provide the required confidentiality. But starting early 2001, many serious cryptographic vulnerabilities were discovered with WEP protocol. Those vulnerabilities were so strong that IEEE had to deprecate the WEP standard. <p>When WEP is active in a wireless LAN, each 802.11 packet is encrypted separately with an RC4 cipher stream generated by a 64 bit RC4 key. This key is composed of a 24 bit initialization vector (IV) and a 40 bit WEP key. The encrypted packet is generated with a bitwise exclusive OR (XOR) of the original packet and the RC4 stream. The IV is chosen by the sender and should be changed so that every packet won't be encrypted with the same cipher stream. The IV is sent in the clear with each packet. An additional 4 byte Integrity Check Value (ICV) is computed on the original packet using the CRC-32 checksum algorithm and appended to the end. </p> <p>This video explains the main flaws in WEP protocol as a cryptographic protocol. The flows discussed in this video are
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.