802.11i and WPA2: addressing WLAN security weaknesses

Friday, 12 March 2004, 3:49 AM EST

802.11i (an implementation of the RC4 algorithm) was proven to be compromised in the widely distributed Fluhrer, Mantin and Shamir whitepaper. Its authors launched an attack against WEP—802.11i’s RC4 encryption method for data privacy—and demonstrated how hackers could easily recover 128-bit secret keys by constructing new distinguishers for RC4 and launching further key attacks. It was then concluded that weakness of the key scheduling algorithm of RC4 enabled hackers to recover encryption keys used in WEP. That, of course, dealt a blow to WEP, the link-layer security protocol for 802.11i, as it meant that the RC4 scheduling algorithm was only strong enough to protect against casual eavesdropping rather than commercial-grade hacking.

By Susana Schwartz at Billing World.

[ Read more ]

Related items




Spotlight

How GitHub is redefining software development

Posted on 26 January 2015.  |  The security industry is slowly realizing what the developer community knew for years - collaboration is the key to and likely the future of innovation.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Wed, Jan 28th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //