Talk:Wired Equivalent Privacy
This is the talk page for discussing improvements to the Wired Equivalent Privacy article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: 1 |
This article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||
|
IEEE Reference
[edit]The fact that you have to pay for access to the reference, lessens its value as a reference and I think should be changed in favour of some other source. 178.167.236.5 (talk) 22:30, 23 March 2013 (UTC)
Crack WEP in x minutes
[edit]The article mentions that a WEP key can be broken in 10, two minutes or less and quotes the FBI breaking WEP in 3minutes. I guess the speed at which WEP can be broken is dependent on the number of packets that are captured, thus it makes more sense to define how many megabytes of data need to be captured to enable an attack? It should then be discussed how quickly this much traffic can be accumulated. Breaking WEP in an office environment, where there are a hundred users should be quicker than a home network, where there is a single user.
EXTRACT: In August 2001, Scott Fluhrer, Itsik Mantin, and Adi Shamir published a cryptanalysis of WEP that exploits the way the RC4 cipher and IV is used in WEP, resulting in a passive attack that can recover the RC4 key after eavesdropping on the network. Depending on the amount of network traffic, and thus the number of packets available for inspection, a successful key recovery could take as little as 10 minutes. If an insufficient number of packets are being sent, there are ways for an attacker to send packets on the network and thereby stimulate reply packets which can then be inspected to find the key. The attack was soon implemented, and automated tools have since been released. It is possible to perform the attack with a personal computer, off-the-shelf hardware and freely available software such as aircrack-ng and crack any WEP key in two minutes or less.--Bah23 13:54, 1 February 2007 (UTC)
- The newer techniques demonstrated by the FBI can stimulate the needed network traffic and do not depend on how busy the network is. See [1] --agr 14:31, 1 February 2007 (UTC)
- From the excerpt you (Bah23) just provided: "If an insufficient number of packets are being sent, there are ways for an attacker to send packets on the network and thereby stimulate reply packets which can then be inspected to find the key."
- So ditto agr, an attacker is able to simulate traffic on a WEP-protected network even if they do not know the key. -- intgr 14:36, 1 February 2007 (UTC)
10 minutes, or even two minutes is for a novice without much experience. I have cracked 64 WEP as part of a security demo in under a minute and a half. —Preceding unsigned comment added by 151.200.33.94 (talk) 22:44, 31 August 2009 (UTC)
Paper preceding Fluhrer/Martin/Shamir
[edit]The article doesn't mention the paper Unsafe at any key size; An analysis of the WEP encapsulation submitted to the IEEE 802.11 working group (?) by Jesse Walker. The paper seems to predate the Fluhrer/Martin/Shamir attack (Oct 2000 vs. 2001) and claims to describe easily implemented, practical attacks against WEP that succeed regardless of the key size or the cipher. Can anybody familiar with this literature judge the merits of this? Grr82 (talk) 05:00, 4 September 2009 (UTC)
Neutrality
[edit]Although it may be true, it doesn't look appropriate to begin the article with a statement about WEP's inadequacies. The page is written as though the author has a particular dislike of the subject, and should be presented with a more matter-of-fact tone. 207.224.78.217 (talk) 06:42, 7 August 2010 (UTC)
I think it should mention more about their properties but not removed the ads on its uncertainty.--PhoneixS (talk) 09:38, 1 December 2010 (UTC)
I don't find the article to be not-neutral. It begins with a statement of facts - that WEP is a deprecated standard, and that it is susceptible to eavesdropping. These are both widely-accepted facts that are essential characteristics of WEP. How is this not neutral? Would it be wrong to start an article on Whale Oil by saying it was a popular source of fuel that is no longer used because it involved killing endangered species? I would like to remove the question about balance / neutrality. Does anyone disagree? Ericcoll (talk) 22:21, 25 January 2011 (UTC)
I thought exactly the same as the original user above. OBVIOUSLY the 'Flaws' of WEP need to be discussed but I'm not sure the opening paragraph is the place to do it: Wikipedia covers many other, far less secure, methods of 'encryption' (ROT13, Caesar Cipher) without taking shots at the algorythms' insecurities. Notably, in the latter example, the "Breaking the Cipher" section (analogus to the WEP article's "Flaws" section) is brought up toward the end of the article. Basically, I think we all agree that Wikipedia should be about facts about the algorythm's design, working and intention, not focussing on the problems and weaknesses of WEP. To put it another way, any encryoption algoryhm (with the exception of a OTP) may be vulnerable to attacks we hadn't considered: vulnerability has to be a different section from content. Apropos to which, I've rewritten the opening paragraphs to be more neutral while still leaving factual material present, e.g. that the algorythm is officially deprecated. --Christopher (talk) 03:02, 10 March 2011 (UTC)
- Generally agreed, especuially with the more harsh criticisms you removed. But I restored some of the detail about being superseded by WPA and the IEEE referring to it is deprecated. Seems germane. --Errant (chat!) 09:51, 10 March 2011 (UTC)
- I think you're right there (possibly I went a bit far in redacting). I'm glad the relevant detail isn't in the first paragraph anymore, save for the word 'deprecated'. --Christopher (talk) 11:22, 10 March 2011 (UTC)
- I removed that word, missed it first time :) You're right, there is no real substance to defining it as deprecated as the third word of the article :P --Errant (chat!) 11:29, 10 March 2011 (UTC)
- I think you're right there (possibly I went a bit far in redacting). I'm glad the relevant detail isn't in the first paragraph anymore, save for the word 'deprecated'. --Christopher (talk) 11:22, 10 March 2011 (UTC)
The name
[edit]I think the alternative name(s) need to be clarified. I have always known this as WEP with properly knowing what the name actually is. However I have seen/heard "wired" and "wireless" both used for the "W", seen/heard both "equivalent" and "encryption" used for the "E", and only seen "protocol" for the "P" (until I found this article). Perhaps a section on this should be added listing the other seven combinations:
- Wired Equivalent Protocol
- Wired Encryption Privacy
- Wired Encryption Protocol
- Wireless Equivalent Privacy
- Wireless Equivalent Protocol
- Wireless Encryption Privacy
- Wireless Encryption Protocol
Astronaut (talk) 12:43, 1 September 2010 (UTC)
Usage by Nintendo
[edit]Is it worth mentioning Nintendo's use of WEP for Nintendo Wi-Fi Connection? The newer Nintendo DSi can connect to the internet using WPA security, but the older Nintendo DS and many games even on the DSi require use of WEP. The recently released Pokemon Black and White games require WEP-based security in order to enable the "mystery gift" that can be downloaded to the game. From the Nintendo support page -- "Nintendo DS games with online play still require the use of WEP or no security to connect with the Nintendo WFC."
Encouraging home users to cripple or entirely disable their wireless security seems irresponsible. Thoughts? — Preceding unsigned comment added by Yggyk (talk • contribs) 03:28, 10 March 2011 (UTC)
Use of the word buddy
[edit]"The access point can then be used to decrypt these packets and relay them on to a buddy on the Internet, allowing real-time decryption of WEP traffic within a minute of eavesdropping the first packet."
Is "Buddy" a technical term? — Preceding unsigned comment added by Hazmog (talk • contribs) 09:39, 20 April 2011 (UTC)
- Hello, 12 years after your question I can report that it probably refers to the buddy-ng tool from the aircrack-ng suite, a kind of "companion" tool to easside-ng that performs some actions on a WEP access point: not the clearest term out of context. I am currently working on that page and may do some work on it when I have more time. Kind regards, IrrationalBeing (talk) 21:42, 18 August 2023 (UTC)
External links modified
[edit]Hello fellow Wikipedians,
I have just modified one external link on Wired Equivalent Privacy. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
- Corrected formatting/usage for http://lirent.net/wifi/what-is-a-wep-key.html
When you have finished reviewing my changes, please set the checked parameter below to true or failed to let others know (documentation at {{Sourcecheck}}
).
This message was posted before February 2018. After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than regular verification using the archive tool instructions below. Editors have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the RfC before doing mass systematic removals. This message is updated dynamically through the template {{source check}}
(last update: 5 June 2024).
- If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
- If you found an error with any archives or the URLs themselves, you can fix them with this tool.
Cheers.—cyberbot IITalk to my owner:Online 08:26, 1 April 2016 (UTC)
aircrack-ng
[edit]Hello everyone, I am currently working on the aircrack-ng page, which includes a history of WEP. When I am done, I will move to this page, which may benefit from a rewrite. In the meantime, if anyone wants to import some data from the aircrack-ng article, feel free. I took care of linking (mostly) academic sources and am also working on a timeline. Regards, IrrationalBeing (talk) 11:21, 2 September 2023 (UTC)
- C-Class Computing articles
- Low-importance Computing articles
- C-Class Computer networking articles
- Mid-importance Computer networking articles
- C-Class Computer networking articles of Mid-importance
- All Computer networking articles
- C-Class Computer Security articles
- Mid-importance Computer Security articles
- C-Class Computer Security articles of Mid-importance
- All Computer Security articles
- All Computing articles
- C-Class Cryptography articles
- Mid-importance Cryptography articles
- C-Class Computer science articles
- Mid-importance Computer science articles
- WikiProject Computer science articles
- WikiProject Cryptography articles