Embed presentation
Download as PDF, PPTX












This document summarizes an attack that can recover a 104-bit WEP key using less than 40,000 encrypted packets. The attack is an improvement over previous methods, requiring an order of magnitude fewer packets. On an IEEE 802.11g network, the required number of packets can be obtained through packet re-injection in under 60 seconds. The computational effort required is approximately 220 RC4 key setups, which is negligible on modern CPUs. WEP remains the most commonly used wireless encryption protocol, despite known security weaknesses.











