[11998] in cryptography@c2.net mail archive
Re: New Protection for 802.11
daemon@ATHENA.MIT.EDU (Arnold G. Reinhold)
Wed Nov 6 23:06:25 2002
In-Reply-To: <CCD3B7FB-F1D7-11D6-A7EE-0003939F95FC@cs.umd.edu>
Date: Wed, 6 Nov 2002 20:25:47 -0500
To: William Arbaugh <waa@cs.umd.edu>, David Honig <dahonig@cox.net>
From: "Arnold G. Reinhold" <reinhold@world.std.com>
Cc: cryptography@wasabisystems.com
See the following two Intel links with detailed discussions of TKIP
and Michael which i found via Google:
>Increasing Wireless Security with TKIP
>
>Forwarded from: "eric wolbrom, CISSP", sa ISN-a...
>
>http://www.secadministrator.com/Articles/Index.cfm?ArticleID=27064
>
>Mark Joseph Edwards
>October 23, 2002
>
>....
>For a more in-depth look at wireless encryption technology, especially
>WEP and TKIP, be sure to read two articles from Intel. The first
>article discusses encryption key management in both WEP and TKIP
>protocols, and the second article discusses TKIP in considerable
>detail.
>
>--
>http://cedar.intel.com/media/pdf/wireless/80211_1.pdf
>http://cedar.intel.com/media/pdf/security/80211_part2.pdf
>
>____________________________
>Gojko Vujovic
>http://www.elitesecurity.org/
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com