I think the bigger concern with the Michael countermeasures is:
1. Will the vendors implement them, and
2. Will they be implemented correctly?
Ideally, the compliance checking will ensure this.......but then again......
TGi had do a delicate balancing act between finding a solution that can be implemented in firmware, and actually makes some improvements. I think they did a reasonable job with WPA1 considering the engineering challenges.
On Thursday, Nov 7, 2002, at 21:07 US/Eastern, Niels Ferguson wrote:
Yes, the Michael countermeasures allow a DOS attack. This was widely discussed in 802.11-TGi before the countermeasures were accepted.
--------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]