Wireless Security
Q&A
Why we used IV packet
to decrypt WEP
• Why we need IVs data?
• In cracking WEP technique , we’ll used airodump-ng –c command to
capture the IVs data from the specific access point.
• The command will capture a file contain IV’s packet (e.g ivdump.ivs)
until certain number IVs.
• IVs data is an arbitrary number or nonce to be used along with
secret/shared key for data encryption. Ivs is NOT a random numbers
• IV used only once in any session, prevent repetition sequences in
encryption text
• In order to decrypt the WEP, we need to used IVs for reverse the
process of encryption.
WEP Encryption Process
RC4
Original
Text
CR32
Encrypted
text
IV
Clear
64 bits
24 bits
40 bits
IV
Shared key
IV Used
RC4
24 bits
40 bits
Original
Text
CR32
Encrypted
text
IV
Clear
WEP Decryption Process
IV
Shared key
64 bits
IV Used
What is Differences
Between WPA and WPA2
WPA WPA2
Independent BSS(IBSS
or ad-hoc
NO YES
Pre-authentication NO YES
AES-CCMP NO YES

Wireless security

  • 1.
  • 2.
    Why we usedIV packet to decrypt WEP • Why we need IVs data? • In cracking WEP technique , we’ll used airodump-ng –c command to capture the IVs data from the specific access point. • The command will capture a file contain IV’s packet (e.g ivdump.ivs) until certain number IVs. • IVs data is an arbitrary number or nonce to be used along with secret/shared key for data encryption. Ivs is NOT a random numbers • IV used only once in any session, prevent repetition sequences in encryption text • In order to decrypt the WEP, we need to used IVs for reverse the process of encryption.
  • 3.
  • 4.
    RC4 24 bits 40 bits Original Text CR32 Encrypted text IV Clear WEPDecryption Process IV Shared key 64 bits IV Used
  • 5.
    What is Differences BetweenWPA and WPA2 WPA WPA2 Independent BSS(IBSS or ad-hoc NO YES Pre-authentication NO YES AES-CCMP NO YES