АТАКА С ПЕРЕУСТАНОВКОЙ КЛЮЧА (KRACK)

Journal Title: INTERNATIONAL ACADEMY JOURNAL "Web of Scholar" - Year 2018, Vol 1, Issue 6

Abstract

In the era of IT great attention is paid to data security and confidentiality on the Internet. Despite that often vulnerabilities and exploits can be found in almost every system. Examples of such vulnerabilities can be a defect in architecture or an error in the data-transfer algorithm. Deprecation of standards can also lead to new exploits. As a result it is a necessary to develop new standards or modernize existing ones. This article is about new vulnerability in authorization process of Wi-Fi networks that make use of WPA2 protocol.

Authors and Affiliations

Оксана Михайловна Бакунова, Александр Михайлович Бакунов, Александр Алексеевич Котлов, Илья Олегович Мартыненко, Василий Олегович Гимик

Keywords

Related Articles

LAUREL SEEDLING GROWTH AND DEVELOPMENT DEPENDENCE ON SEEDING TIME IN WEST GEORGIA CONDITIONS

Laurel is a widespread subtropical culture, the leaves of which are unchangeable product for various branches of agriculture. Laurel plantations are basically built by seedlings, but according to the literal data, it is...

О ПОСТРОЕНИИ ОДНОГО ИЛИ ОТБОРОЧНОГО КУРСА МАТЕМАТИЧЕСКОГО ИЛИ ЭКОНОМИЧЕСКОГО ПОТОКА СТАРШЕЙ ШКОЛЫ

This article discusses teaching applied mathematics as an elective course in the economic batch of a high school. The problem of finding the capacity of a maximum flow in the network is brought as an example. An algorit...

ІМПЛЕМЕНТАЦІЯ КАТЕГОРІЇ «ФАРМАЦЕВТИЧНА ПОСЛУГА» У СИСТЕМУ НАДАННЯ АДМІНІСТРАТИВНИХ ПОСЛУГ В УКРАЇНІ

The article deals with the categories «service», «administrative service», «administrative service in the field of health care», «pharmaceutical service». Also, administrative services in the field of health are singled...

STATELESS АВТОРИЗАЦИЯ С ИСПОЛЬЗОВАНИЕМ JWT

A lot of web-developers have or will encounter the problem of authorization in their projects. Classic authorization scheme involves generating a random string (named token), then storing it with a set of attached privil...

ДОМОГОСПОДАРСТВО ТА ДОМАШНЄ ГОСПОДАРСТВО: СУТНІСТЬ І ХАРАКТЕРНІ РИСИ

The increasing complexity of economic processes and many other factors stimulate the intensification of research in the field of households, rethinking and improving the conceptual and categorical terminological apparatu...

Download PDF file
  • EP ID EP322228
  • DOI 10.31435/rsglobal_wos/12062018/5739
  • Views 163
  • Downloads 0

How To Cite

Оксана Михайловна Бакунова, Александр Михайлович Бакунов, Александр Алексеевич Котлов, Илья Олегович Мартыненко, Василий Олегович Гимик (2018). АТАКА С ПЕРЕУСТАНОВКОЙ КЛЮЧА (KRACK). INTERNATIONAL ACADEMY JOURNAL "Web of Scholar", 1(6), 38-39. https://europub.co.uk/articles/-A-322228