Re: 802.11 Wired Equivalent Privacy (WEP) attacks

2001-02-17 Thread Niels Provos
In message 962j9b$bd5$[EMAIL PROTECTED], David Wagner writes: * Use a VPN with strong end-to-end cryptographic authentication and encryption (e.g., IPSEC or equivalent) At CITI, we protect the traffic between base station and wavelan clients via IPsec. The setup is very simple and it works

Re: 802.11 Wired Equivalent Privacy (WEP) attacks

2001-02-13 Thread itojun
WF1 In WF1 the 802.11 WEP keys would be changed many times each hour, say every 10 minutes. A parameter, P , determines how many time per hour the key is to be changed, where P must divide 3600 evenly. The WEP keys are derived from a master key, M, by taking the low order N bits (N = 40,

Re: 802.11 Wired Equivalent Privacy (WEP) attacks

2001-02-13 Thread Arnold G. Reinhold
At 5:55 AM +0900 2/10/2001, [EMAIL PROTECTED] wrote: WF1 In WF1 the 802.11 WEP keys would be changed many times each hour, say every 10 minutes. A parameter, P , determines how many time per hour the key is to be changed, where P must divide 3600 evenly. The WEP keys are derived from a master

Re: 802.11 Wired Equivalent Privacy (WEP) attacks

2001-02-13 Thread R. A. Hettinga
At 12:05 PM -0500 on 2/8/01, Arnold G. Reinhold wrote: Thus there is a need for a short term remedy that can work with the existing standard. Not to pull your leg (too hard), or anything, but, we were told, at mac-crypto, that it's called "super-encryption". ;-) IPSec anyone? Cheers, RAH

Re: 802.11 Wired Equivalent Privacy (WEP) attacks

2001-02-13 Thread David Wagner
Arnold G. Reinhold wrote: Thus there is a need for a short term remedy that can work with the existing standard. Maybe the easiest short term remedy that does not require any changes to hardware is the following: * Put the wireless network outside your firewall (or place a firewall

Re: 802.11 Wired Equivalent Privacy (WEP) attacks

2001-02-09 Thread Arnold G. Reinhold
The draft paper by Borisov, Goldberg, and Wagner http://www.isaac.cs.berkeley.edu/isaac/wep-draft.pdf presents a number of practical attacks on 802.11 Wired Equivalent Privacy (WEP). The right way to fix them, as the paper points out, is to rework the 802.11 protocol to use better encryption

Re: 802.11 Wired Equivalent Privacy (WEP) attacks

2001-02-06 Thread Derek Atkins
Unfortunately these are not new attacks. Some IETFers were talking about these as long as 1.5 years ago. This new paper is just a formalization of the (previously known, or at least guessed) attacks. About a year ago we theorized that we could guess a key by passive eavesdropping. However

802.11 Wired Equivalent Privacy (WEP) attacks

2001-02-05 Thread P.J. Ponder
as reported on Good Morning Silicon Valley: Researchers from UC Berkeley and private security firm Zero-Knowledge Systems have uncovered a means of disrupting the Wired Equivalent Privacy (WEP) algorithm, an important part of the 802.11 corporate standard for wireless computer networks. While