Talk:Temporal Key Integrity Protocol
This article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||
|
How weak is it?
[edit]The article sort of implies WEP-TKIP is breakable - the article needs to state how bad it is. Tempshill (talk) 05:56, 26 August 2008 (UTC)
Copyright
[edit]Just FYI... the text of part of this article looks to be word for word identical to: http://www.networkworld.com/reviews/2004/1004wirelesstkip.html?page=1 —Preceding unsigned comment added by 69.16.222.122 (talk) 21:33, 9 November 2008 (UTC)
- It looks like that was added by an IP User 98.207.235.138. I'm restoring most of what was there before, and redoing the rest. In fact, the text that was replaced is not as good as the previous text. For instance, WEPs problem was not its keylength (at least not in 104/128 mode), but rather its key scheduling (so to speak).LH (talk) 05:26, 11 November 2008 (UTC)
New TKIP attacks
[edit]I've expanded and updated the Security section in response to the Beck-Tews attack. If my description/explanation of the attack is incorrect, please correct it accordingly, and provide additional information here on the talk page. LH (talk) 05:15, 11 November 2008 (UTC)
Ohigashi-Morii Attack
[edit]The attack by Toshihiro Ohigashi and Masakatu Morii has no public implementation. The authors never seem to have proven it actually works. One of the few tools available to attack TKIP, which is the tkiptun-ng tool of the aircrack-ng toolsuite, has no mention of this attack. This is contrast with the other practical TKIP attacks mentioned on the page (those all have an implementation). Unless someone objects, I wouldn't consider this an attack on TKIP, in particular as it only claims to be a minor improvement anyway. — Preceding unsigned comment added by Thenetsec (talk • contribs) 23:39, 6 January 2015 (UTC)