On Wed, 13 Jun 2007 19:50:49 +0100, "Ian Pascoe" <[EMAIL PROTECTED]> wrote: > Hi Folks > > Some clarity on these times to break please! > > Is this done by snooping the traffic that is going between the computer > and > router or by bombarding the router with various keys until it responds? > > Anyone know for sure? I know a couple of guys who work on computer > crypotography and they quote figures like a million transfered packets to > get the key reliably .... and they know cos they've done it. > > E
IIRC, this was from sniffing packets then doing a local bruteforce on the sniffed data. the ever-reliable (??!!!) register has this article: http://www.theregister.co.uk/2007/05/15/wep_crack_interview/ which states: "When WEP was compromised in 2001, the attack needed more than five million packets to succeed. During the summer of 2004, a hacker named KoreK published a new WEP attack (called chopper) that reduced by an order of magnitude the number of packets requested, letting people crack keys with hundreds of thousands of packets, instead of millions. Last month, three researchers, Erik Tews, Andrei Pychkine and Ralf-Philipp Weinmann developed a faster attack (based on a cryptanalysis of RC4 by Andreas Klein), that works with ARP packets and just needs 85,000 packets to crack the key with a 95 per cent probablity. This means getting the key in less than two minutes." Cheers, Matt. -- Matthew Macdonald-Wallace Lug-Master (http://www.thanet.lug.org.uk), Dad (http://www.helpmeimadad.com/), Ubuntu User( http://www.ubuntu.com/) -- ubuntu-uk@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk https://wiki.kubuntu.org/UKTeam/