User Tools

Site Tools


chopchoptheory

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Last revision Both sides next revision
chopchoptheory [2006/11/19 16:12]
darkaudax
chopchoptheory [2007/02/28 22:05]
darkaudax
Line 36: Line 36:
  
 By doing this, we have found a valid frame 1 byte shorter than original one, and we have guessed one byte of keystream. This process can be induced to get the whole keystream. By doing this, we have found a valid frame 1 byte shorter than original one, and we have guessed one byte of keystream. This process can be induced to get the whole keystream.
 +
 +For additional detailed descriptions see:
 +
 +  * [[http://​www.netstumbler.org/​showthread.php?​t=12489|Chopchop Attack]] in the original Netstumbler thread.
 +  * [[http://​www.informit.com/​guides/​printerfriendly.asp?​g=security&​seqNum=196|Byte-Sized Decryption of WEP with Chopchop, Part 1]] and [[http://​www.informit.com/​guides/​printerfriendly.asp?​g=security&​seqNum=197|Byte-Sized Decryption of WEP with Chopchop, Part 2]]
 +
 +
  
chopchoptheory.txt ยท Last modified: 2010/11/21 15:46 by sleek