"P.J. Ponder" <[EMAIL PROTECTED]> writes:
> as reported on Good Morning Silicon Valley:
>
> Researchers from UC Berkeley and private security firm Zero-Knowledge
> Systems have uncovered a means of disrupting the Wired Equivalent Privacy
> (WEP) algorithm, an important part of the 802.11 corporate standard for
> wireless computer networks. While data transmitted over these networks is
> encrypted, the researchers determined that it was easy to modify 802.11
> equipment to pillage that data.
>
> http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html
I'm a little unclear on what's supposed to be the new information here.
The fact that the per-packet IV was way too short and that you could
build a lookup table for packets has been known for months. It was already
old news at IETF San Diego in early December.
I'm not sure about the other attacks--though the MAC problem is
pretty obvious once you know that it's CRC and encrypted with RC4.
-Ekr
[Eric Rescorla [EMAIL PROTECTED]]
http://www.rtfm.com/