
108
Chapter 5: Authentication and Encryption
AirMagnet Laptop Wireless LAN Policy Reference Guide
mechanism is used, data exchanged between an AP and its client
stations is subject to eavesdropping by intruders. Clients with WEP
disabled risk their file system, which may contain confidential
corporate information from wireless intruders. These clients can then
act as an entry point into the corporate network for intruders.
AirMagnet Laptop Analyzer detects devices that are not using any
encryption and recommends that the user use higher encryption
mechanisms.
Crackable WEP IV Key Used
It is well publicized that WLAN devices using static WEP key for
encryption are vulnerable to WEP key cracking attack (Refer to
Weaknesses in the Key Scheduling Algorithm of RC4 - I by Scott
Fluhrer, Itsik Mantin, and Adi Shamir
).
Figure 5-2: WEP Encipherment Block Diagram
The WEP secret key that has been cracked by any intruder results in
no encryption protection, thus leading to compromised data privacy.
The WEP key that is in most cases 64-bit or 128-bit (few vendors also
offer 152-bit encryption) consists of the secret key, which is specified
by the user, concatenated with the 24-bit IV (Initialization Vector),
which is determined by the transmitting station. The IV can be reused
frequently in consecutive frames, thus increasing the chance of the
secret key being recovered by wireless intruders. By excluding
certain IV values that would create so-called “weak keys,” the
weakness of WEP as described in the above paper is avoided.
AirMagnet Mobile alerts on weak WEP implementations and
recommends a device firmware upgrade (if available) from the
device vendor to correct the IV usage problem. Ideally, enterprise
WLAN networks can protect against WEP vulnerability by using the
Laptop Wireless LAN Policy Reference Guide.book Page 108 Thursday, January 25, 2007 5:36 PM
Summary of Contents for PRG-Laptop 7.0
Page 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...