On 9/21/14, Daniel <kyhw...@gmail.com> wrote:
> Hey coderman,
> has this been released anywhere? I asked because I discovered
> http://people.cs.kuleuven.be/~mathy.vanhoef/papers/wpatkip.pdf again.
> (Where with TKIP, if you can inject packets on the air, you can get
> back unencrypted traffic that was headed towards the client..)


hi Daniel!

please continue posting relevant material.  this is released plus or
minus Full Disclosure   moderation queue. you are smart enough to see
why this is a dead end, and "optional" TKIP will live in WPA2 forever.

you may also want to keep in touch with K. Paterson who wrote about
another TKIP issue as mentioned earlier in this thread.  i have not
heard of any further input from K. i have not seen any further public
confirmation of active TKIP downgrade or implications.

silence the story, per usual.

best regards,
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to