WF1
In WF1 the 802.11 WEP keys would be changed many times each hour, say
every 10 minutes. A parameter, P , determines how many time per hour
the key is to be changed, where P must divide 3600 evenly. The WEP
keys are derived from a master key, M, by taking the low order N
bits (N = 40,
At 5:55 AM +0900 2/10/2001, [EMAIL PROTECTED] wrote:
WF1
In WF1 the 802.11 WEP keys would be changed many times each hour, say
every 10 minutes. A parameter, P , determines how many time per hour
the key is to be changed, where P must divide 3600 evenly. The WEP
keys are derived from a master
At 12:05 PM -0500 on 2/8/01, Arnold G. Reinhold wrote:
Thus there is a need for a short term remedy that can work with the
existing standard.
Not to pull your leg (too hard), or anything, but, we were told, at
mac-crypto, that it's called "super-encryption". ;-)
IPSec anyone?
Cheers,
RAH
Arnold G. Reinhold wrote:
Thus there is a need for a short term remedy that can work with the
existing standard.
Maybe the easiest short term remedy that does not require
any changes to hardware is the following:
* Put the wireless network outside your firewall
(or place a firewall
I've done a bunch more work on Envelope Mail, as always, the latest info
is at -
http://gawth.com/bram/envelope_mail/
New is actual code, complete with test code. Plans are next to write a
patch for BoboMail implementing the dummy version of the crypto API.
I could use immediate help on the