User Tools

Site Tools


chopchoptheory

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Last revisionBoth sides next revision
chopchoptheory [2006/11/19 16:12] darkaudaxchopchoptheory [2007/02/28 22:05] darkaudax
Line 36: Line 36:
  
 By doing this, we have found a valid frame 1 byte shorter than original one, and we have guessed one byte of keystream. This process can be induced to get the whole keystream. By doing this, we have found a valid frame 1 byte shorter than original one, and we have guessed one byte of keystream. This process can be induced to get the whole keystream.
 +
 +For additional detailed descriptions see:
 +
 +  * [[http://www.netstumbler.org/showthread.php?t=12489|Chopchop Attack]] in the original Netstumbler thread.
 +  * [[http://www.informit.com/guides/printerfriendly.asp?g=security&seqNum=196|Byte-Sized Decryption of WEP with Chopchop, Part 1]] and [[http://www.informit.com/guides/printerfriendly.asp?g=security&seqNum=197|Byte-Sized Decryption of WEP with Chopchop, Part 2]]
 +
 +
  
chopchoptheory.txt · Last modified: 2010/11/21 15:46 by sleek