Completed
ASCI Mapping Reduces Entropy
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cracking WEP Keys
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Talk overview
- 3 Why Perform Dictionary attacks on WEP?
- 4 Wired Equivalent Privacy
- 5 WEP Encryption
- 6 WEP Authentication
- 7 128-bit Variant
- 8 WEP Keying
- 9 Key Entry Example
- 10 64-bit key Generator
- 11 64-bit Generator Flawed!
- 12 ASCI Mapping Reduces Entropy
- 13 PRNG Use Reduces Entropy
- 14 Entropy of 64-bit Generator is 21-bits
- 15 128-bit Generator
- 16 Designed and implemented a WEP Cracker
- 17 Structure of WEP Cracker
- 18 Packet Collector
- 19 Making Guesses
- 20 Mapping Guesses to Keys
- 21 Key Verification
- 22 Results
- 23 Brute Force of Keys
- 24 Implications
- 25 Related work - Bad News
- 26 That's All Folks...