At 12:06 11/11/02 -0500, Arnold G. Reinhold wrote:
[...]
>1. Shuffle the order of the message words stirred into Michael. For
[...]
I can't go into details here due to NDA considerations, but this idea
cannot be efficiently implemented on some of the existing hardware.
>2. Refresh the Michael
Here are some thoughts that occur to me for improving the security of
802.11 WPA message authentication (MIC), based on what I read in
Jesse Walker's paper
http://cedar.intel.com/media/pdf/security/80211_part2.pdf.
One approach is to second guess Niels Ferguson and try to find a
different comb