Back to Results
First PageMeta Content
IEEE 802.11 / Wireless networking / Stream ciphers / Wired Equivalent Privacy / RC4 / Initialization vector / Keystream / Block cipher modes of operation / Ciphertext / Cryptography / Computer network security / Cryptographic protocols


Intercepting Mobile Communications: The Insecurity of[removed] —DRAFT— Nikita Borisov UC Berkeley
Add to Reading List

Document Date: 2001-02-02 14:52:13


Open Document

File Size: 95,88 KB

Share Result on Facebook

City

Reading / /

Company

P RS RT . / Lucent / Microsoft / /

Currency

USD / /

IndustryTerm

Internet host / wireless network / wireless systems / Internet connectivity / wireless link / wireless transmissions / unsupported operating systems / wireless networks / wireless technology / wireless network drivers / link-layer communications / computing / internal wireless network / wireless access / modest computing resources / wireless network infrastructure / cryptographic protocol / encryption algorithm / wireless transmission / compliant devices / technology containing cryptography / /

Organization

US Government / UC Berkeley / /

Person

Ian Goldberg / Nikita Borisov / /

Position

driver / RT / RS RT / &RT / protocol designer / quantity RS RT / /

Product

Message Injection / Orinoco cards / Orinoco / /

Technology

4 Message Authentication The WEP protocol / RC4 algorithm / WEP / control network / PPTP protocol / IP Security protocol / 2.1 Security Goals Encryption / encryption algorithm / IP protocols / IP router / cryptographic protocol / secret key / 2 The WEP Protocol The Wired Equivalent Privacy protocol / wireless technology / SSL / operating systems / TCP/IP / encryption / Ethernet / cryptography / RC4 encryption algorithm / wireless access / WEP protocol / dom / 802.11 protocol / PDA / The WEP protocol / wireless LAN / stream cipher / encrypted using a stream cipher / /

SocialTag