KRACK: Key Reinstallation AttaCK

History

Properties of XOR (we'll write it as )

Ciphers: block and stream

Wi-Fi WPA2 encryption

WPA2 (Wi-Fi Protected Access version 2) Protocol

Protocol (as seen from the supplicant)

Man-in-the-middle setup

KRACK: The attack

In practice, the intruder's job is hard.

The fix

Users should employ end-to-end encryption.

Manufacturers are patching their software

Take-home messages