Share Email Print
cover

Proceedings Paper

Analysis of selected methods for the recovery of encrypted WEP key
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

This paper deals with some of the WEP (Wired Equivalent Privacy) key decryption methods based on aircrack-ng software, which was embedded in Backtrack operating system (Linux distribution). The 64-bit (40-bit) and 128-bit (104- bit) key encrypted with RC4 cipher weakness was shown. Research methods were made in different network environments. In this work we compared different types of keys to check how strong the RC4 stream cipher can be. The 40-bit and 104-bit WEP key has been tested on IEEE 802.11 based wireless LAN using laptop with live-CD Linux operating system. A short analysis of key creation methods was performed to compare the amount of time necessary to decrypt random and nonrandom WEP keys.

Paper Details

Date Published: 16 December 2014
PDF: 7 pages
Proc. SPIE 9290, Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2014, 92902Z (16 December 2014); doi: 10.1117/12.2075251
Show Author Affiliations
Sebastian Wójtowicz, Kielce Univ. of Technology (Poland)
Radosław Belka, Kielce Univ. of Technology (Poland)


Published in SPIE Proceedings Vol. 9290:
Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments 2014
Ryszard S. Romaniuk, Editor(s)

© SPIE. Terms of Use
Back to Top