Foundations of Network and Foundations of Network and Computer Security Computer Security
J John Black
Lecture #24 Nov 29th 2005
CSCI 6268/TLEN 5831, Fall 2005
Foundations of Network and Foundations of Network and Computer - - PowerPoint PPT Presentation
Foundations of Network and Foundations of Network and Computer Security Computer Security J ohn Black J Lecture #24 Nov 29 th 2005 CSCI 6268/TLEN 5831, Fall 2005 Announcements Remainder of the semester: Project #2 is due today (please
CSCI 6268/TLEN 5831, Fall 2005
– c() is an unkeyed CRC (cyclic redundancy check)
– RC4 is a stream cipher
random bits and it produces (essentially) infinite pseudo-random bits
– v is an IV
detected
(optional part of the 802.11 standard)
k IV 40 bits 24 bits k IV 104 bits 24 bits Recall: IV is public, so shouldn’t count as “key”
Note: Four keys allowed to encourage key-rotation, but this has to all be synchronized among all users of the WLAN.
– Pad is RC4(v, k) – k is fixed for all communications
power up your laptop
within 5000 packets (a few mins in the scenario above)
– Once we figure out the plaintext
– …then we know the keystream – Put keystream and IV into a table for later use
keystream of its IV
– But this approach works against the 104-bit key as well