DSpace Repository

Cracking Wired Equivalent Privacy (CWEP)

Show simple item record

dc.contributor.author DARADKEH, Yousef
dc.contributor.author MU’NGER, Ahid AL
dc.date.accessioned 2019-11-09T14:53:25Z
dc.date.available 2019-11-09T14:53:25Z
dc.date.issued 2011
dc.identifier.citation DARADKEH, Yousef, MU’NGER, Ahid AL. Cracking Wired Equivalent Privacy (CWEP). In: Microelectronics and Computer Science: proc. of the 7th intern. Conf., September 22-24, 2011. Chişinău, 2011, vol. 1, pp. 333-337. ISBN 978-9975-45-174-1. en_US
dc.identifier.isbn 978-9975-45-174-1
dc.identifier.uri http://repository.utm.md/handle/5014/6496
dc.description.abstract The fact that most wireless networks are not secured has been reported, discussed, lectured on, and more. About the only way you could have avoided this is if you were completely removed from every form of paper and electronic media. However, all this media hype has not had the desired effect! Believe it or not, an estimated 60[nd] 70% of all wireless networks in existence are still NOT using even the most basic of protections. As a result, any hacker can drive around the block and probably find an open and hack able wireless network. This is problem number one. Problem number two is a bit more technical, and will be the main subject for this article. This problem concerns the weaknesses surrounding WEP. The Wireless Equivalent Privacy protocol defines how a wireless network is secured. In short, it determines what encryption and authentication method is used to secure wireless data. The problem with WEP is in the way the data is encrypted. As discovered by three researchers, WEP can be cracked by anyone with a sniffer, which is the name given to the hardware device or software that can capture data as it flies through the air. This basically means that all those companies that think they are securely using their wireless network are doing so under false pretenses. This article deals with this issue, and explains just what cracking WEP means. I will show you just how hackers will attack you and take advantage of this weakness to capture your secret key right out of the air, which they can then use to connect to your secure wireless network. en_US
dc.language.iso en en_US
dc.publisher Technical University of Moldova en_US
dc.rights Attribution-NonCommercial-NoDerivs 3.0 United States *
dc.rights.uri http://creativecommons.org/licenses/by-nc-nd/3.0/us/ *
dc.subject cracking wep en_US
dc.subject wireless networks en_US
dc.subject networks en_US
dc.title Cracking Wired Equivalent Privacy (CWEP) en_US
dc.type Article en_US


Files in this item

The following license files are associated with this item:

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 United States Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 United States

Search DSpace


Advanced Search

Browse

My Account