Score:0

How many bits of encryption are enforced in WEP (wired equivalent protocol)

jp flag

I'm currently taking a computer security module in University and as part of a problem have been asked:

enter image description here

My thought for the question is that no it does not provide 64 bits of security strength. This is as (IV,C) is transmitted over the network meaning that if the signal were intercepted by an adversary IV can easily be obtained as it has not been encrypted and hence is not confidential meaning that it doesn't add to the overall security. Rather 40 bits of security are enforced as K is not sent with the signal so the adversary cannot know K.

If anyone could comment on my answer or provide any alternative insight, it would be greatly appreciated.

Many thanks

NOTE: Edited answer to comment on how many bits I believe are actually enforced

Score:1
si flag

You are correct. The strength of a cipher is bounded by its key length, and while the IV may matter that changes how much data can safely be encrypted before needing to change the key, not the overall strength.

Additionally, RC4 is broken, and doesn't even provide as much strength as what its key length would imply. So RC4 with a 40-bit key isn't even 40 bits of security. This is part of why WEP is deprecated in favor of WPA2 (WPA1 had some other issues).

forest avatar
vn flag
As far as I'm aware, 40-bit RSA does provide 40-bit security (unless a related key attack is relevant), but the distinguishability of the keystream allows for plaintext recovery in some cases.
poncho avatar
my flag
WPA1 was designed as a stop gap measure; one requirement was that it had to be implementable as a software upgrade on everything implementing WEP, that severely limited the options the WPA1 designers had.
SAI Peregrinus avatar
si flag
That plaintext recovery takes less than 2^40 operations: a non-negligible advantage in the IND-CPA game can be achieved with less work than brute-force. I'd say that's enough to classify as "less than 40 bits of security". It's not key recovery, If all you care about is avoiding key recovery, then RC4 is secure. If you care about the plaintext, then it's very risky. Not always guaranteed broken, but certainly not safe.
forest avatar
vn flag
@SAIPeregrinus You're right. I was only talking about key recovery. Even without that, it's really insecure.
I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.