Wireless Personal Communications

, Volume 70, Issue 4, pp 1235–1241 | Cite as

A Probability Problem Arising from the Security of the Temporal Key Hash of WPA

  • Rui A. C. FerreiraEmail author


In this paper we raise and discuss a problem from the analysis done in Moen et al. (ACM SIGMOBILE Comput Commun Rev 8(2):76–83, 2004) about some weaknesses in the key scheduling in Wi-Fi protected access (WPA).


Probability TKIP Security of wireless devices WPA 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Borisov, N., Goldberg, I., & Wagner, D. (2001). Intercepting mobile communications: The insecurity of 802.11. In MOBICOM 2001, Rome, Italy, July 2001.Google Scholar
  2. 2.
    Edney J., Arbaugh W. A. (2005) Real 802.11 security: Wi-Fi protected access and 802.11i. Addison-Wesley, BostonGoogle Scholar
  3. 3.
    Fluhrer, S. R., Mantin, I., & Shamir, A. (2001). Weaknesses in the key scheduling algorithm of RC4. In SAC: Annual International Workshop on Selected Areas in Cryptography, LNCS.Google Scholar
  4. 4.
    Moen V., Raddum H., Hole K. J. (2004) Weaknesses in the temporal key Hash of WPA. ACM SIGMOBILE Computing and Communications Review 8(2): 76–83CrossRefGoogle Scholar
  5. 5.
    Morgadoz A., Carvalho J., Carvalho P., Fernandez P. (1991) Análise combinatória e probabilidade. Gráfica Wagner Ltda, Rio de JaneiroGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC. 2012

Authors and Affiliations

  1. 1.Department of MathematicsLusophone University of Humanities and TechnologiesLisbonPortugal

Personalised recommendations