[9549] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: New encryption technology closes WLAN security loopholes

daemon@ATHENA.MIT.EDU (Matt Crawford)
Mon Oct 1 15:56:33 2001

Date: Mon, 01 Oct 2001 10:48:00 -0500
From: Matt Crawford <crawdad@fnal.gov>
In-reply-to: "01 Oct 2001 00:36:42 PDT."
 <5.0.2.1.1.20011001002633.036f94a0@idiom.com>
To: Bill Stewart <bill.stewart@pobox.com>
Cc: cryptography@wasabisystems.com
Message-id: <200110011548.f91Fm0m00690@gungnir.fnal.gov>

> One interesting issue with radio networks is Man-in-the-middle attacks,
> because nobody can intercept a request and forward it
> faster than you can receive it directly, unless there are
> distances that are too far for the two parties to reach each other
> but still let the MITM contact both.

The would-be MITM has two tactics available that still allow it to
operate as "usual":

 Receive the initial portion of a message but jam the last N bits to
 cause it to be ignored by all other receivers, or

 Jam the entire message with noise that its own equipment can
 compensate for.

In the first case the geometry of the target, the MITM, the other
receivers or base station and the effective range of the stations
may demand that too much of the signal has to be jammed to let the
MITM function, unless it can also implement the second.



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post