WPA Attacks

Chop-Chop Attack The main attack against TKIP is called the Chopchop attack and it is not a key recovery attack. The chopchop attack was implemented originally against WEP and allows the “attacker to interactivelydecrypt the last m bytes of plaintext of an encrypted packet by sending m*128 packets in average to the network .It relies on the weakness of the CRC32 checksum called the ICV which is appended to the data of the packet. The attacker truncates the last byte of the encrypted packet and guesses the value and returns the packet to the...

Wireless Security Attacks

Encryption-Based Attacks As wireless networks were being developed the need for security was a top priority. With the ratification of the IEEE 802.11 protocol in 1999, Wired Equivalent Privacy (WEP) was introduced to fulfill that need. The motivation behind WEP was to provide the same level of security that wired networks allowed protecting the integrity of the data being sent. WEP uses the RC4 stream cipher to encrypt data with a 40-bit user defined key that is salted (pre-pended) with a 24-bit initialization vector (IV). The small key size...

How to Build a Secure Wireless Network

Encryption: The Secret Code The single most important way to secure a wireless network is to protect it with strong encryption. Encryption technology basically scrambles network traffic using mathematical algorithms that prevents eavesdroppers from understanding the content. Encryption is fairly straightforward to set up, but there are two important choices that must be made when using encryption to properly secure a network.First, choose a good encryption method. Refrain from using the Wired Equivalent Privacy (WEP) encryption algorithm. This...

Wireless Technology Overview

Wireless Technology Overview Wireless technologies enable one or more devices to communicate without an actual wired connection. Radio frequency is used to transmit the data. Such technologies are rapidly evolving to meet a variety of communications needs, from simple to complex. Wireless communications needs can all be classified in one of three ways, based on the distance they are meant to cover. These include: wireless personal area networks...