Kevin,
I understand the inherent problem of RC4 is its structure on
exposing publicly expose the initialization vector and using finite number
of fixed shared "prviate" key, thus allowing --- at least in
theory --- sending a known simple text as a basis to decrypt some of the
messages when a key is reused.
Do you know how this part is different in the new standard?
Thanks in advance.
Bon
On Thu, 5 Dec 2002, Kevin Arima wrote:
> On Thu, 5 Dec 2002, Jon Baer wrote:
>
> > What about the upcoming WPA standard? (is it even shipping yet?) Is
> > EAP part of it?
> >
>
> You mean TKIP? That just uses RC4 in a different manner, I believe.
>
> Kevin "Starfox" Arima
>
> --
> NYCwireless - http://www.nycwireless.net/
> Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/
> Archives: http://lists.nycwireless.net/pipermail/nycwireless/
>
--
NYCwireless - http://www.nycwireless.net/
Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/
Archives: http://lists.nycwireless.net/pipermail/nycwireless/