Provided by: Cornell University
Date Added: Oct 2014
In this paper, the author's present new attacks against TKIP within IEEE 802.11 based networks. Using the known Beck-Tews attack, they define schemas to continuously generate new key streams, which allow more and longer arbitrary packets to be injected into the network. They further describe an attack against the Michael message integrity code that allows an attacker to concatenate a known with an unknown valid TKIP packet such that the unknown MIC at the end is still valid for the new entire packet.