New encryption technology closes WLAN security loopholes

Matt Crawford crawdad at fnal.gov
Mon Oct 1 11:48:00 EDT 2001


> One interesting issue with radio networks is Man-in-the-middle attacks,
> because nobody can intercept a request and forward it
> faster than you can receive it directly, unless there are
> distances that are too far for the two parties to reach each other
> but still let the MITM contact both.

The would-be MITM has two tactics available that still allow it to
operate as "usual":

 Receive the initial portion of a message but jam the last N bits to
 cause it to be ignored by all other receivers, or

 Jam the entire message with noise that its own equipment can
 compensate for.

In the first case the geometry of the target, the MITM, the other
receivers or base station and the effective range of the stations
may demand that too much of the signal has to be jammed to let the
MITM function, unless it can also implement the second.



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com




More information about the cryptography mailing list