On Wed, 13 Jun 2007 19:50:49 +0100, "Ian Pascoe" <[EMAIL PROTECTED]> wrote:
> Hi Folks
> 
> Some clarity on these times to break please!
> 
> Is this done by snooping the traffic that is going between the computer
> and
> router or by bombarding the router with various keys until it responds?
> 
> Anyone know for sure?  I know a couple of guys who work on computer
> crypotography and they quote figures like a million transfered packets to
> get the key reliably .... and they know cos they've done it.
> 
> E

IIRC, this was from sniffing packets then doing a local bruteforce on the 
sniffed data.

the ever-reliable (??!!!) register has this article: 
http://www.theregister.co.uk/2007/05/15/wep_crack_interview/ which states:

"When WEP was compromised in 2001, the attack needed more than five million 
packets to succeed. During the summer of 2004, a hacker named KoreK published a 
new WEP attack (called chopper) that reduced by an order of magnitude the 
number of packets requested, letting people crack keys with hundreds of 
thousands of packets, instead of millions.

Last month, three researchers, Erik Tews, Andrei Pychkine and Ralf-Philipp 
Weinmann developed a faster attack (based on a cryptanalysis of RC4 by Andreas 
Klein), that works with ARP packets and just needs 85,000 packets to crack the 
key with a 95 per cent probablity. This means getting the key in less than two 
minutes."

Cheers,

Matt.
--
Matthew Macdonald-Wallace
Lug-Master (http://www.thanet.lug.org.uk),
Dad (http://www.helpmeimadad.com/),
Ubuntu User( http://www.ubuntu.com/)


-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.kubuntu.org/UKTeam/

Reply via email to