Talk:Temporal Key Integrity Protocol

Latest comment: 9 years ago by Thenetsec in topic Ohigashi-Morii Attack

How weak is it?

edit

The article sort of implies WEP-TKIP is breakable - the article needs to state how bad it is. Tempshill (talk) 05:56, 26 August 2008 (UTC)Reply

edit

Just FYI... the text of part of this article looks to be word for word identical to: http://www.networkworld.com/reviews/2004/1004wirelesstkip.html?page=1 —Preceding unsigned comment added by 69.16.222.122 (talk) 21:33, 9 November 2008 (UTC)Reply

It looks like that was added by an IP User 98.207.235.138. I'm restoring most of what was there before, and redoing the rest. In fact, the text that was replaced is not as good as the previous text. For instance, WEPs problem was not its keylength (at least not in 104/128 mode), but rather its key scheduling (so to speak).LH (talk) 05:26, 11 November 2008 (UTC)Reply

New TKIP attacks

edit

I've expanded and updated the Security section in response to the Beck-Tews attack. If my description/explanation of the attack is incorrect, please correct it accordingly, and provide additional information here on the talk page. LH (talk) 05:15, 11 November 2008 (UTC)Reply

Ohigashi-Morii Attack

edit

The attack by Toshihiro Ohigashi and Masakatu Morii has no public implementation. The authors never seem to have proven it actually works. One of the few tools available to attack TKIP, which is the tkiptun-ng tool of the aircrack-ng toolsuite, has no mention of this attack. This is contrast with the other practical TKIP attacks mentioned on the page (those all have an implementation). Unless someone objects, I wouldn't consider this an attack on TKIP, in particular as it only claims to be a minor improvement anyway. — Preceding unsigned comment added by Thenetsec (talkcontribs) 23:39, 6 January 2015 (UTC)Reply