802.11i and WPA2: addressing WLAN security weaknesses

Friday, 12 March 2004, 3:49 AM EST

802.11i (an implementation of the RC4 algorithm) was proven to be compromised in the widely distributed Fluhrer, Mantin and Shamir whitepaper. Its authors launched an attack against WEP—802.11i’s RC4 encryption method for data privacy—and demonstrated how hackers could easily recover 128-bit secret keys by constructing new distinguishers for RC4 and launching further key attacks. It was then concluded that weakness of the key scheduling algorithm of RC4 enabled hackers to recover encryption keys used in WEP. That, of course, dealt a blow to WEP, the link-layer security protocol for 802.11i, as it meant that the RC4 scheduling algorithm was only strong enough to protect against casual eavesdropping rather than commercial-grade hacking.

By Susana Schwartz at Billing World.

[ Read more ]

Related items




Spotlight

The psychology of phishing

Posted on 23 July 2014.  |  Cybercriminals no longer send out thousands of emails at random hoping to get a handful of hits, today they create highly targeted phishing emails which are tailored to suit their recipients.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Jul 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //