New Protection for 802.11

Arnold G. Reinhold reinhold at world.std.com
Wed Nov 6 20:25:47 EST 2002


See the following two Intel links with detailed discussions of TKIP 
and Michael which i found via Google:

>Increasing Wireless Security with TKIP
>
>Forwarded from: "eric wolbrom, CISSP", sa ISN-a...
>
>http://www.secadministrator.com/Articles/Index.cfm?ArticleID=27064
>
>Mark Joseph Edwards
>October 23, 2002
>
>....
>For a more in-depth look at wireless encryption technology, especially
>WEP and TKIP, be sure to read two articles from Intel. The first
>article discusses encryption key management in both WEP and TKIP
>protocols, and the second article discusses TKIP in considerable
>detail.
>
>--
>http://cedar.intel.com/media/pdf/wireless/80211_1.pdf
>http://cedar.intel.com/media/pdf/security/80211_part2.pdf
>
>____________________________
>Gojko Vujovic
>http://www.elitesecurity.org/



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com



More information about the cryptography mailing list