ExamGecko
Question list
Search
Search

Related questions











Question 170 - 212-81 discussion

Report
Export

In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.

Which Algorithm is this referring to?

A.
Wired Equivalent Privacy (WEP)
Answers
A.
Wired Equivalent Privacy (WEP)
B.
Wi-Fi Protected Access 2 (WPA2)
Answers
B.
Wi-Fi Protected Access 2 (WPA2)
C.
Wi-Fi Protected Access (WPA)
Answers
C.
Wi-Fi Protected Access (WPA)
D.
Temporal Key Integrity Protocol (TKIP)
Answers
D.
Temporal Key Integrity Protocol (TKIP)
Suggested answer: A

Explanation:

Wired Equivalent Privacy (WEP)

https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy#Weak_security

In 2007, Erik Tews, Andrei Pychkine, and Ralf-Philipp Weinmann were able to extend Klein's 2005 attack and optimize it for usage against WEP. With the new attack it is possible to recover a 104-bit WEP key with probability 50% using only 40,000 captured packets. For 60,000 available data packets, the success probability is about 80% and for 85,000 data packets about 95%. Using active techniques like deauth and ARP re-injection, 40,000 packets can be captured in less than one minute under good conditions. The actual computation takes about 3 seconds and 3 MB of main memory on a Pentium-M 1.7 GHz and can additionally be optimized for devices with slower CPUs. The same attack can be used for 40-bit keys with an even higher success probability.

asked 18/09/2024
Bryan Sprowls
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first