Key Reinstallation Attacks - Breaking the WPA2 Protocol

Key Reinstallation Attacks - Breaking the WPA2 Protocol

Black Hat via YouTube Direct link

Limitations of formal proofs

13 of 15

13 of 15

Limitations of formal proofs

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Key Reinstallation Attacks - Breaking the WPA2 Protocol

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Overview
  3. 3 The 4-way handshake
  4. 4 4-way handshake (simplified)
  5. 5 Frame encryption (simplified)
  6. 6 Key Reinstallation Attack
  7. 7 General impact
  8. 8 Cipher suite specific
  9. 9 Handshake specific
  10. 10 Implementation specific
  11. 11 Countermeasures
  12. 12 Misconceptions II
  13. 13 Limitations of formal proofs
  14. 14 Keep protocols simple
  15. 15 Need rigorous specifications

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.