![]() |
802.11D: Additional Regulatory Domains |
![]() |
802.11E: Quality of Service (QoS) |
![]() |
802.11F: Inter-Access Point Protocol (IAPP) |
![]() |
802.11G: Higher data rates at 2.4 GHz |
![]() |
802.11H: Dynamic Channel Selection and Transmission Power Control |
![]() |
802.11i: Authentication and Security |
"Eavesdropping is a familiar problem to users of other types of wireless technology. IEEE 802.11 specifies a wired LAN equivalent data confidentiality algorithm. Wired equivalent privacy is defined as protecting authorized users of a wireless LAN from casual eavesdropping. This service is intended to provide functionality for the wireless LAN equivalent to that provided by the physical security attributes inherent to a wired medium."As you see, the aim of WEP is to provide a level of privacy equivalent to that of a wired LAN. The wording of standard is very important here: the developers of the standard did not intend to provide a level of security superior to or higher than that of a regular wired LAN, such as Ethernet. The very name of the algorithm, "Wireless Equivalent Privacy," signifies the actual intention of the developers. However, as the practice has shown, the level of security roughly equivalent to the level of security provided by wired LANs is not sufficient—and it is the assumption that "it is OK if wireless LANs are as secure as wired LANs" that is wrong. Other problems, such as the choice of Cyclic Redundancy Check 32 (CRC-32) instead of Message Digest Algorithm 5 (MD5) or some other secure hash algorithm, just worsen the problem.
"Unfortunately, WEP falls short of accomplishing its security goals. Despite employing the well-known and believed-secure RC4 cipher, WEP contains several major security flaws. The flaws give rise to a number of attacks, both passive and active, that allow eavesdropping on, and tampering with, wireless transmissions."They go on to say that WEP fails to achieve all three of its security goals, namely confidentiality, access control, and data integrity.
"The WEP protocol contains vulnerabilities despite the designers' apparent knowledge of the dangers of keystream reuse attacks."Another not less important but equally poorly designed aspect of WEP is the use of CRC-32. It is known that CRCs are not cryptographically strong and are not intended to be used in place of message digest or hash functions such as MD5 or the Secure Hash Algorithm (SHA). Because of the nature of CRC, it fails to provide the required integrity protection.