03.11.2012 Views

Wireless LAN Security with 802.1x, EAP-TLS, and PEAP - Black Hat

Wireless LAN Security with 802.1x, EAP-TLS, and PEAP - Black Hat

Wireless LAN Security with 802.1x, EAP-TLS, and PEAP - Black Hat

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Classes of attacks<br />

Key <strong>and</strong> IV reuse<br />

Small IV space; no IV replay protection<br />

Known plaintext attack<br />

Can recover stream of length N for a given IV<br />

Then forge packets of length N in absence of<br />

keyed IC<br />

Partial known plaintext attack<br />

Can recover M bytes of keystream, M < N<br />

Repeated probing � extend keystream to N<br />

Weaknesses in RC4 key scheduling<br />

algorithm<br />

Large class of weak keys can break secret key

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!