1 00:00:00,240 --> 00:00:01,020 Hi, everyone. 2 00:00:01,320 --> 00:00:07,050 In this lecture, we are going to see what is WBB, which is the white equivalent priority. 3 00:00:07,440 --> 00:00:12,120 So as we all know that it is the oldest one and it can be easily broken. 4 00:00:12,750 --> 00:00:18,600 So WSP uses algorithm called Oddisee for encryption, which as you can see here. 5 00:00:21,130 --> 00:00:29,110 OK, so in this algorithm, each packet is encrypted at the router or access point and then sent out 6 00:00:29,110 --> 00:00:29,840 into the air. 7 00:00:30,550 --> 00:00:36,910 So what the client receives this packet, the client will be able to transform its back to its original 8 00:00:36,910 --> 00:00:39,220 form because it has the key. 9 00:00:39,700 --> 00:00:46,600 So in other words, we can see that the router includes the packets and send it and the client receives 10 00:00:46,600 --> 00:00:48,080 the packet and decrypted. 11 00:00:48,520 --> 00:00:52,170 So the same happens if the client sent something to the router. 12 00:00:52,660 --> 00:00:59,680 So it will first encrypt the packet using a key and send it to the router and the router will be able 13 00:00:59,680 --> 00:01:02,170 to decrypt it because it has the key. 14 00:01:02,830 --> 00:01:09,000 So in this process, if a hacker captures the packet in the middle, then they will get the packet, 15 00:01:09,010 --> 00:01:14,240 but they would not be able to see the content of the packet because they do not have the key. 16 00:01:15,550 --> 00:01:20,130 So each packet that is sent into the air has a unique stream. 17 00:01:20,800 --> 00:01:30,310 So the unique stream is generated using 24 bit initialization vector, which, as you can see, is 24 18 00:01:30,310 --> 00:01:31,490 Bedivere BlueSky. 19 00:01:32,080 --> 00:01:40,180 OK, so an initialization vector is a random number that is sent into each packet in a plain text form, 20 00:01:40,870 --> 00:01:42,240 which is not encrypted. 21 00:01:42,760 --> 00:01:49,750 So if someone captures the packet, they will not be able to read the packet content because it is encrypted. 22 00:01:50,110 --> 00:01:51,310 But they can read the. 23 00:01:52,840 --> 00:01:58,640 What did this ivy in the plane text bomb, because it is not encrypted. 24 00:01:59,090 --> 00:02:05,020 OK, is this clear which as you can see here, we are having this key, which is I.V. and it is going 25 00:02:05,020 --> 00:02:06,320 in plain text. 26 00:02:06,660 --> 00:02:14,500 OK, so the weakness with the I.V. is that it is sent in a plain text and it is very solid, which is 27 00:02:14,500 --> 00:02:15,890 only 24 bed. 28 00:02:16,510 --> 00:02:21,320 So in a busy network, there will be a large number of packets sent in the air. 29 00:02:22,000 --> 00:02:26,070 So at this time, 24, but no, it's not big enough. 30 00:02:27,100 --> 00:02:34,750 So the I.V. will start repeating on a busy network so the repeated IVs can be used to determine the 31 00:02:34,750 --> 00:02:35,560 key stream. 32 00:02:35,920 --> 00:02:43,450 So this makes an WSP vulnerable to statistical attack so determined simply in order to determine the 33 00:02:43,450 --> 00:02:46,970 key stream, we can use a tool called aircraft. 34 00:02:47,560 --> 00:02:50,280 So this tool is used to determine the key stream. 35 00:02:50,680 --> 00:02:58,090 So once we have enough repeated Ivey's, then it will also be able to crack WSP and give us the key 36 00:02:58,090 --> 00:03:01,750 to the network, which we are going to see very soon in this section. 37 00:03:02,380 --> 00:03:07,570 So this is all about how WSP folks and what it is.