WEP vs WPA - What is better solution?

WEP vs WPA – which to use? The answer for this question is very easy - WPA!

Here you can check how scientists have cracked WEP in less than 60 seconds. WEP, which has been used from 1999, has never deserved its name - Wired Equivalent Privacy.

WPA has opened a new page in WLAN security. Wi-Fi Alliance has launched WPA in October 2003. You can use the same equipment, with much better security option – WPA. The only thing you need to do is to upgrade the software and firmware.

Main weaknesses of WEP are:

1) The same IV (initialization vector) can be used more than once. This feature makes WEP very vulnerable, especially to collision-based attacks.

2) With IV of 24 bits, you only have about 16.7 million of possible combinations.

3) Masters keys, instead of temporary keys, are directly used.

4 Most users usually do not change their keys. This gives hackers more time to crack the encryption.

Advantages of WPA over WEP are:

1) Length of IV (initialization vector) is now 48, comparing to WEP’s 24. This gives you over 500 trillion possible key combinations.

2) IV has much better protection with better encryption methods. This is prevention of reuse of IV keys.

3) Master keys are never directly used.

4) Better key management.

5) Impressive message integrity checking.

When you take all this into account, you can see that WPA is much better solution for your wireless network.

--------

these days we are moving and preferring wireless wifi networks in home and i personally noticed working in ISP people mostly use the basic WEP security system and most of you might know this already that WEP password is easily breakable/hackable so always use WPA or WPA2 its more secured then WEP.

---

more info

http://compudent.blogspot.com/2006/09/wireless-wep-vs-wpa-vs-wpa2.html

What is the purpose of this thread?

WPA is better but most wireless devices are configured on WEP by default.

I myself am using WPA2. Works fine and is quite secure. No known breach yet.

this has been proven long before that WPA is much more secure as compared to WEP

bruteforce wpa2.. with a large dictionary... takes 5 or so minutes to crack.

[quote=", post:, topic:"]

bruteforce wpa2… with a large dictionary… takes 5 or so minutes to crack.
[/quote]

thats assuming the person has set the key to a word that exsists in the dictionary

but if they key is somethin like this sl1pKno5 then it wud be hard to crack

[quote=", post:, topic:"]

thats assuming the person has set the key to a word that exsists in the dictionary

but if they key is somethin like this sl1pKno5 then it wud be hard to crack

[/quote]

Exactly!

The strength of your network (in WPA/WPA2) depends on your key.

[quote=", post:, topic:"]

but if they key is somethin like this sl1pKno5 then it wud be hard to crack
[/quote]

is that your password?

[quote=", post:, topic:"]

is that your password?

[/quote]

no just an example ,for passwords i use a random character generator and just save the passwords in a text file

[quote=", post:, topic:"]

What is the purpose of this thread?

WPA is better but most wireless devices are configured on WEP by default.

I myself am using WPA2. Works fine and is quite secure. No known breach yet.

[/quote]

purpose of the thread for the noobish wireless users those dont even know the about wireless security is possible and 2ndly if people normally uses security they use basic WEP so keeping in view just for awareness , nothing more.

is dere any effect on the speed of the connection, and the processor usage of connecting devices like router and a pocket pc ?? if we use WPA rather than WEP ??

^ Not a noticeable one.

[quote=", post:, topic:"]

thats assuming the person has set the key to a word that exsists in the dictionary

but if they key is somethin like this sl1pKno5 then it wud be hard to crack

[/quote]

I am not talking abt just any ordinary dictionary… this dictionary has been compiled with the help of passwords people use on porn sites/ etc… Have you ever seen a porn site getting brute forced? Thats not ur ordinary brute force, they have hashtables, they have adaptive algos etc… not only they could guess the password , they were even able to guess the usernames.And yes most of the passwords are not liek pakistan1, islamabd1, abc123, some of the policies enforce strict password rules that resulted in really complicated passwords. But this was 2-3 years ago before the advent of CAPTCHA METHOD :). I didnt believe it myself till a friend of mine gave me 500Kb list of passwords of every site u can imagine , to prove his point. Am not makin this up, complicated WpA2 passwords have been broken, u can search that on google. The point is even though a ordinary home user shldnt have nay problems with wpa2, its not pefetct. It takes a little determination to break that and some kick a** xx GB dictionary table.

[quote=", post:, topic:"]

I am not talking abt just any ordinary dictionary… this dictionary has been compiled with the help of passwords people use on porn sites/ etc… Have you ever seen a porn site getting brute forced? Thats not ur ordinary brute force, they have hashtables, they have adaptive algos etc… not only they could guess the password , they were even able to guess the usernames.And yes most of the passwords are not liek pakistan1, islamabd1, abc123, some of the policies enforce strict password rules that resulted in really complicated passwords. But this was 2-3 years ago before the advent of CAPTCHA METHOD :). I didnt believe it myself till a friend of mine gave me 500Kb list of passwords of every site u can imagine , to prove his point. Am not makin this up, complicated WpA2 passwords have been broken, u can search that on google. The point is even though a ordinary home user shldnt have nay problems with wpa2, its not pefetct. It takes a little determination to break that and some kick a** xx GB dictionary table.

[/quote]

And few months of processing power or a huge farm of zoombies.

[quote=", post:, topic:"]

And few months of processing power or a huge farm of zoombies.

[/quote]

Actually the term is botnet not zombies :P and no you never need massive computing power to find a combination… its a plain key…not a 128bit encrypted cypher

[quote=", post:, topic:"]

Actually the term is botnet not zombies :P and no you never need massive computing power to find a combination… its a plain key…not a 128bit encrypted cypher

[/quote]

Botnet is a collection of zombies anyways. This specifically is not my field of expertise but last time I read, it was extremely complicated to brute force an 8 character key. A password like sl1pKno5 is no where to be find in common patterns and even 8 characters is a lot. Bruteforce is almost impossible in this case.

I don’t know much about hash-tables though and from what I have read, it’s an extremely slow process and that too requires massive computing power.