Handwritten Text Recognition for manuscripts and early printed texts
Wepwhacker !
1. WEP Whacker Aim of the project : To exploit the weaknesses in the key scheduling algorithm of RC4 as used in WEP and thus recover encryption keys with passive attack on 802.11 network
2.
3.
4.
5.
6.
7. WEP Data Transmission 802.11b Header IV[0] IV[1] IV[2] Key ID SNAP[0] SNAP[1] SNAP[2] SNAP[3] 32-bit Checksum Payload
11. WEP Data Transmission K = IV . SK Encrypted Data K = IV . SK Node Node Uses received IV with Static Key to decrypt data
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46. FMS Attack - Filtering Weak IVs Weak IV Filter: Let l = the amount of elements in SK i = 0 For B = 0 .. l - 1 If (((0 <= a and b < B) or (a = B and b = (B + 1) / 2 : 1)) and (B % 2 ? a != (B + 1) / 2 : 1)) or (a = B + 1 and (B = 0 ? B = (B + 1) * 2 : 1)) or (x = B + 3 and y = N - 1) or (B != 0 and !(B % 2) ? (x = 1 and y = (B / 2) + 1) or (x = (B / 2) + 2 and y = (N - 1) - x) : 0) Then ReportWeakIV