Blog

Encrypted Web and Wi-Fi at risk as RC4 attacks become more practical

Posted by:

There’s an old saying in the security community: Attacks always get better. The latest case where that holds true is for the aging RC4 cipher that’s still widely used to encrypt communications on the Internet.

Researchers Mathy Vanhoef and Frank Piessens from the University of Leuven in Belgium devised a new attack method that can recover authentication cookies and other sensitive information from Web connections encrypted with RC4.

The RC4 (Rivest Cipher 4) algorithm was designed in 1987 by renowned cryptographer Ron Rivest and remained a trade secret until 1994, when it was leaked on the Internet. Since then it has been implemented in a number of popular protocols, including SSL (Secure Socket Layer) and its successor, TLS (Transport Layer Security); the WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) wireless security standards; Microsoft’s RDP (Remote Desktop Protocol) and MPPE (Microsoft Point-to-Point Encryption), BitTorrent and others.

To read this article in full or to leave a comment, please click here

0


About the Author

We offers a proactive approach to IT support, Managed IT Services, Hosted Cloud Services, and IT Project Management. We are focused on anticipating and mitigating any IT infrastructure problems you might incur. We offer the most unique blend IT project consulting, complete cloud-based services, and network/server management techniques to provide a customized solution for any size business. We are the premier provider of Managed IT Services, IT Support Services, Hosted Cloud Servers, Hosted Microsoft Exchange Email, Hosted VoIP PBX and Outsourced IT solutions. We service Texas from our main offices in Austin, Dallas, Houston and San Antonio. Our unique blend of computer networking services, cloud-based offerings, and professional IT services are provided by certified IT consulting professionals. We strive to be your one source for all technology guidance, support, hardware, software, and telephony. Using cutting edge network management tools and expertise, We will monitor your company’s network activity 24x7x365 in an effort to correct emerging issues well before they escalate to a level that forces business as usual to cease.

# #