[MLB-WIRELESS] Re: Strong WEP Key Generator
paul van den bergen
pvandenbergen at swin.edu.au
Tue May 6 11:48:45 EST 2003
On Tue, 6 May 2003 12:52 am, rik wrote:
> but how much data do they have to collect before they can crack a 128bit in
> a few hours? isnt it like 2 weeks worth?
read the article! *sheesh*
5 to 6 million packets... which is a few hours worth for a moderately loaded
link. (for 128 bit WEP)
not that this is just preventing WEP key discovery for bandwidth theft. there
are apparently other weaknesses that make the actual data vulnerable too, so
it depends exactly what you want to protect. Mind you I have not found a
really clear discussion of all the threats to data security from WEP.... most
just focus on the big hole, not teh other smaller holes...
the article says also...
quote
When completed, 802.11i will use Temporal Key Integrity Protocol (TKIP). TKIP
addresses the WEP static key problem by dynamically updating the key, based
on WEP's own RC4 encryption across all devices once for every 10,000 packets
transmitted. For vendors, the good news is that existing devices can be
updated with firmware updates. The bad news is that 128-bit RC4 changed every
10,000 packets is still breakable. Even TKIP supporters admit that, at best,
it's a stopgap solution to wireless security.
end quote.
I have no idea why wep is still breakable, but there you go...
--
Dr Paul van den Bergen
Centre for Advanced Internet Architectures
caia.swin.edu.au
pvandenbergen at swin.edu.au
IM:bulwynkl2002
"And some run up hill and down dale, knapping the chucky stones
to pieces wi' hammers, like so many road makers run daft.
They say it is to see how the world was made."
Sir Walter Scott, St. Ronan's Well 1824
To unsubscribe: send mail to majordomo at wireless.org.au
with "unsubscribe melbwireless" in the body of the message
More information about the Melbwireless
mailing list