Re: 802.11 Wired Equivalent Privacy (WEP) attacks

2001-02-13 Thread itojun
WF1 In WF1 the 802.11 WEP keys would be changed many times each hour, say every 10 minutes. A parameter, P , determines how many time per hour the key is to be changed, where P must divide 3600 evenly. The WEP keys are derived from a master key, M, by taking the low order N bits (N = 40,

Re: 802.11 Wired Equivalent Privacy (WEP) attacks

2001-02-13 Thread Arnold G. Reinhold
At 5:55 AM +0900 2/10/2001, [EMAIL PROTECTED] wrote: WF1 In WF1 the 802.11 WEP keys would be changed many times each hour, say every 10 minutes. A parameter, P , determines how many time per hour the key is to be changed, where P must divide 3600 evenly. The WEP keys are derived from a master

Re: 802.11 Wired Equivalent Privacy (WEP) attacks

2001-02-13 Thread R. A. Hettinga
At 12:05 PM -0500 on 2/8/01, Arnold G. Reinhold wrote: Thus there is a need for a short term remedy that can work with the existing standard. Not to pull your leg (too hard), or anything, but, we were told, at mac-crypto, that it's called "super-encryption". ;-) IPSec anyone? Cheers, RAH

Re: 802.11 Wired Equivalent Privacy (WEP) attacks

2001-02-13 Thread David Wagner
Arnold G. Reinhold wrote: Thus there is a need for a short term remedy that can work with the existing standard. Maybe the easiest short term remedy that does not require any changes to hardware is the following: * Put the wireless network outside your firewall (or place a firewall

New stuff with Envelope Mail

2001-02-13 Thread Bram Cohen
I've done a bunch more work on Envelope Mail, as always, the latest info is at - http://gawth.com/bram/envelope_mail/ New is actual code, complete with test code. Plans are next to write a patch for BoboMail implementing the dummy version of the crypto API. I could use immediate help on the