Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Related-key attack
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==WEP== An important example of a cryptographic protocol that failed because of a related-key attack is [[Wired Equivalent Privacy]] (WEP) used in [[Wi-Fi]] wireless networks. Each client [[Wireless network interface controller|Wi-Fi network adapter]] and [[wireless access point]] in a WEP-protected network shares the same WEP key. Encryption uses the [[RC4]] algorithm, a [[stream cipher]]. It is essential that the same key never be used twice with a stream cipher. To prevent this from happening, WEP includes a 24-bit [[initialization vector]] (IV) in each message packet. The RC4 key for that packet is the IV concatenated with the WEP key. WEP keys have to be changed manually and this typically happens infrequently. An attacker therefore can assume that all the keys used to encrypt packets share a single WEP key. This fact opened up WEP to a series of attacks which proved devastating. The simplest to understand uses the fact that the 24-bit IV only allows a little under 17 million possibilities. Because of the [[birthday paradox]], it is likely that for every 4096 packets, two will share the same IV and hence the same RC4 key, allowing the packets to be attacked. More devastating attacks take advantage of certain [[weak key]]s in RC4 and eventually allow the WEP key itself to be recovered. In 2005, agents from the U.S. [[Federal Bureau of Investigation]] publicly demonstrated the ability to do this with widely available software tools in about three minutes.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)