802.11i and WPA2: addressing WLAN security weaknesses

Friday, 12 March 2004, 3:49 AM EST

802.11i (an implementation of the RC4 algorithm) was proven to be compromised in the widely distributed Fluhrer, Mantin and Shamir whitepaper. Its authors launched an attack against WEP—802.11i’s RC4 encryption method for data privacy—and demonstrated how hackers could easily recover 128-bit secret keys by constructing new distinguishers for RC4 and launching further key attacks. It was then concluded that weakness of the key scheduling algorithm of RC4 enabled hackers to recover encryption keys used in WEP. That, of course, dealt a blow to WEP, the link-layer security protocol for 802.11i, as it meant that the RC4 scheduling algorithm was only strong enough to protect against casual eavesdropping rather than commercial-grade hacking.

By Susana Schwartz at Billing World.

[ Read more ]

Related items




Spotlight

Emerging cloud threats and how to address them

Posted on 15 September 2014.  |  Public and community clouds can be appealing targets for hackers looking to disrupt or steal information from scores of organizations with one successful strike. Here are some emerging security threats and issues cloud providers and their clients should be aware of.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Sep 16th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //