New attack exploits WPA in 60 seconds

ThraxThrax 🐌Austin, TX Icrontian
edited August 2009 in Science & Tech

Comments

  • MiracleManSMiracleManS Chambersburg, PA Icrontian
    edited August 2009
    Thank you for the breath of fresh air at the end Rob. Some people seriously overplay the danger of these attacks.

    Nice to see some journalistic integrity regarding these matters.
  • SnarkasmSnarkasm Madison, WI Icrontian
    edited August 2009
    I just wanted to see who the "other sites" link pointed to, so I rolled over it, saw The Inq, and laughed hardcore when I caught "wpa-gone" as the article title.
  • djmephdjmeph Detroit Icrontian
    edited August 2009
    What's the reason for the added security with AES? Is that the shared key that gets re-generated every so often? Like every 30 seconds or so, right? Then you have the private network key which you create yourself. Am I right?
  • ThraxThrax 🐌 Austin, TX Icrontian
    edited August 2009
    AFAIK, the key you supply to a WPA network is the cipher used to generate the actual key. TKIP and AES are simply different cryptosystems, and it appears TKIP has a flaw when it comes to generating the keys used to encrypt individual packets (the message check key).
  • djmephdjmeph Detroit Icrontian
    edited August 2009
    And the actual key gets re-generated regularly, correct?
  • ThraxThrax 🐌 Austin, TX Icrontian
    edited August 2009
    That's correct. The paper specifies that a certain error occurs in the key generation in fairly regular intervals under TKIP.
Sign In or Register to comment.