Cracking of Wireless Networks - Theoretical Information

Theoretical Information

  • Weaknesses in the Key Scheduling Algorithm of RC4 by Scott Fluhrer, Itsik Mantin, and Adi Shamir, 2001 or later.
  • Detecting Wireless LAN MAC Address Spoofing by Joshua Wright, 2003.
  • A Survey of 802.11a Wireless Security Threats and Security Mechanisms by Colonel Donald J. Welch, Ph.D. and Major Scott D. Lathrop, 2003.
  • Weaknesses in the Temporal Key Hash of WPA by Vebjørn Moen, Håvard Raddum, and Kjell J. Hole, 2004.
  • Attacks on the RC4 stream cipher by Andreas Klein, 2006.
  • Break WEP faster with statistical analysis by Rafik Chaabouni, 2006.
  • Wi-Fi Security - How to Break and Exploit by Hallvar Helleseth, 2006.
  • Securing Wireless Networks from ARP Cache Poisoning by Roney Philip, 2007.
  • Breaking 104 bit WEP in less than 60 seconds by Erik Tews, Ralf-Philipp Weinmann and Andrei Pyshkin, 2007.
  • Attacks on the WEP protocol by Erik Tews, 2007.
  • Practical attacks against WEP and WPA by Martin Beck and Erik Tews, 2008.
  • WPA password cracking - Parallel Processing on the Cell BE by Martin Daniel, 2009.
  • Cryptanalysis of IEEE 802.11i TKIP by Finn Michael Halvorsen and Olav Haugen, 2009.
  • A Practical Message Falsification Attack on WPA by Toshihiro Ohigashi and Masakatu Morii, 2009 or later.

Read more about this topic:  Cracking Of Wireless Networks

Famous quotes containing the words theoretical and/or information:

    The desire to serve the common good must without fail be a requisite of the soul, a necessity for personal happiness; if it issues not from there, but from theoretical or other considerations, it is not at all the same thing.
    Anton Pavlovich Chekhov (1860–1904)

    In the information age, you don’t teach philosophy as they did after feudalism. You perform it. If Aristotle were alive today he’d have a talk show.
    Timothy Leary (b. 1920)