[Cryptography] [FORGED] Re: Severe flaw in WPA2 protocol leaves Wi-Fi traffic open to eavesdropping

Neuhaus Stephan (neut) neut at zhaw.ch
Tue Oct 17 03:35:44 EDT 2017


On 2017-10-17 03:09, Peter Gutmann wrote:

> Is it?  While it's a cool attack, and yet another reason why RC4-equivalent
> ciphers like GCM should be banned (we finally got rid of RC4, and now we're
> busy reintroducing it under another name), […]

While I agree with you, I wish you good luck with getting GCM banned. TLS 1.3 cipher suites are all stream ciphers. The list of TLS 1.3 cipher suites is (in full) [see https://datatracker.ietf.org/doc/draft-ietf-tls-tls13/?include_text=1, Section 8.4]: 

TLS_AES_128_GCM_SHA256
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SHA256
TLS_AES_128_CCM_SHA256
TLS_AES_128_CCM_8_SHA256

If it’s good enough for TLS, then surely it’s good enough for WiFi, right? 

Fun,

Stephan



More information about the cryptography mailing list