[Cryptography] [FORGED] Re: Severe flaw in WPA2 protocol leaves Wi-Fi traffic open to eavesdropping
    Neuhaus Stephan (neut) 
    neut at zhaw.ch
       
    Tue Oct 17 03:35:44 EDT 2017
    
    
  
On 2017-10-17 03:09, Peter Gutmann wrote:
> Is it?  While it's a cool attack, and yet another reason why RC4-equivalent
> ciphers like GCM should be banned (we finally got rid of RC4, and now we're
> busy reintroducing it under another name), […]
While I agree with you, I wish you good luck with getting GCM banned. TLS 1.3 cipher suites are all stream ciphers. The list of TLS 1.3 cipher suites is (in full) [see https://datatracker.ietf.org/doc/draft-ietf-tls-tls13/?include_text=1, Section 8.4]: 
TLS_AES_128_GCM_SHA256
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256
TLS_AES_128_CCM_SHA256
TLS_AES_128_CCM_8_SHA256
If it’s good enough for TLS, then surely it’s good enough for WiFi, right? 
Fun,
Stephan
    
    
More information about the cryptography
mailing list