Kevin,
        
        I understand the inherent problem of RC4 is its structure on
exposing publicly expose the initialization vector and using finite number
of fixed shared "prviate" key, thus allowing --- at least in
theory --- sending a known simple text as a basis to decrypt some of the
messages when a key is reused. 

        Do you know how this part is different in the new standard?

        Thanks in advance.

Bon


On Thu, 5 Dec 2002, Kevin Arima wrote:

> On Thu, 5 Dec 2002, Jon Baer wrote:
> 
> > What about the upcoming WPA standard?  (is it even shipping yet?)  Is
> > EAP part of it?
> >
> 
> You mean TKIP?  That just uses RC4 in a different manner, I believe.
> 
> Kevin "Starfox" Arima
> 
> --
> NYCwireless - http://www.nycwireless.net/
> Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/
> Archives: http://lists.nycwireless.net/pipermail/nycwireless/
> 

--
NYCwireless - http://www.nycwireless.net/
Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/
Archives: http://lists.nycwireless.net/pipermail/nycwireless/

Reply via email to