Email Delivery

Receive new posts as email.

Email address

Syndicate this site

RSS | Atom

Contact

About This Site
Contact Us
Privacy Policy

Search


November 2010
Sun Mon Tues Wed Thurs Fri Sat
  1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30        

Stories by Category

Basics :: Basics
Casting :: Casting Listen In Podcasts Videocasts
Culture :: Culture Hacking
Deals :: Deals
FAQ :: FAQ
Future :: Future
Hardware :: Hardware Adapters Appliances Chips Consumer Electronics Gaming Home Entertainment Music Photography Video Gadgets Mesh Monitoring and Testing PDAs Phones Smartphones
Industry :: Industry Conferences Financial Free Health Legal Research Vendor analysis
International :: International
Media :: Media Locally cached Streaming
Metro-Scale Networks :: Metro-Scale Networks Community Networking Municipal
Network Types :: Network Types Broadband Wireless Cellular 2.5G and 3G 4G Power Line Satellite
News :: News Mainstream Media
Politics :: Politics Regulation Sock Puppets
Schedules :: Schedules
Security :: Security 802.1X
Site Specific :: Site Specific Administrative Detail April Fool's Blogging Book review Cluelessness Guest Commentary History Humor Self-Promotion Unique Wee-Fi Who's Hot Today?
Software :: Software Open Source
Spectrum :: Spectrum 60 GHz
Standards :: Standards 802.11a 802.11ac 802.11ad 802.11e 802.11g 802.11n 802.20 Bluetooth MIMO UWB WiGig WiMAX ZigBee
Transportation and Lodging :: Transportation and Lodging Air Travel Aquatic Commuting Hotels Rails
Unclassified :: Unclassified
Vertical Markets :: Vertical Markets Academia Enterprise WLAN Switches Home Hot Spot Aggregators Hot Spot Advertising Road Warrior Roaming Libraries Location Medical Public Safety Residential Rural SOHO Small-Medium Sized Business Universities Utilities wISP
Voice :: Voice

Archives

November 2010 | October 2010 | September 2010 | August 2010 | July 2010 | June 2010 | May 2010 | April 2010 | March 2010 | February 2010 | January 2010 | December 2009 | November 2009 | October 2009 | September 2009 | August 2009 | July 2009 | June 2009 | May 2009 | April 2009 | March 2009 | February 2009 | January 2009 | December 2008 | November 2008 | October 2008 | September 2008 | August 2008 | July 2008 | June 2008 | May 2008 | April 2008 | March 2008 | February 2008 | January 2008 | December 2007 | November 2007 | October 2007 | September 2007 | August 2007 | July 2007 | June 2007 | May 2007 | April 2007 | March 2007 | February 2007 | January 2007 | December 2006 | November 2006 | October 2006 | September 2006 | August 2006 | July 2006 | June 2006 | May 2006 | April 2006 | March 2006 | February 2006 | January 2006 | December 2005 | November 2005 | October 2005 | September 2005 | August 2005 | July 2005 | June 2005 | May 2005 | April 2005 | March 2005 | February 2005 | January 2005 | December 2004 | November 2004 | October 2004 | September 2004 | August 2004 | July 2004 | June 2004 | May 2004 | April 2004 | March 2004 | February 2004 | January 2004 | December 2003 | November 2003 | October 2003 | September 2003 | August 2003 | July 2003 | June 2003 | May 2003 | April 2003 | March 2003 | February 2003 | January 2003 | December 2002 | November 2002 | October 2002 | September 2002 | August 2002 | July 2002 | June 2002 | May 2002 | April 2002 | March 2002 | February 2002 | January 2002 | December 2001 | November 2001 | October 2001 | September 2001 | August 2001 | July 2001 | June 2001 | May 2001 | April 2001 |

Recent Entries

In-Flight Wi-Fi and In-Flight Bombs
Can WPA Protect against Firesheep on Same Network?
Southwest Sets In-Flight Wi-Fi at $5
Eye-Fi Adds a View for Web Access
Firesheep Makes Sidejacking Easy
Wi-Fi Direct Certification Starts
Decaf on the Starbucks Digital Network
Google Did Snag Passwords
WiMax and LTE Not Technically 4G by ITU Standards
AT&T Wi-Fi Connections Keep High Growth with Free Service

Site Philosophy

This site operates as an independent editorial operation. Advertising, sponsorships, and other non-editorial materials represent the opinions and messages of their respective origins, and not of the site operator. Part of the FM Tech advertising network.

Copyright

Entire site and all contents except otherwise noted © Copyright 2001-2010 by Glenn Fleishman. Some images ©2006 Jupiterimages Corporation. All rights reserved. Please contact us for reprint rights. Linking is, of course, free and encouraged.

Powered by
Movable Type

« Second Wi-Fi Advertising Hotspot Network | Main | OrangeWare Offers Mac Owners Atheros Super G »

May 2, 2004

Broadcom Says EZ Does It

Broadcom introduces shortcut for creating strong Wi-Fi Protected Access (WPA) keys without the fuss of memorizing long base-16 numbers: Broadcom's new method of guiding home users to create a WPA encryption key without having any technical knowledge has the unwieldy name of SecureEZSetup. But the name is more complicated than the technology: a simple two-step wizard in which users choose two out of four personal questions to answer from which a full-length 16-byte WPA key is generated. The user can then answer the questions the same way on another computer or enter the hexadecimal key for non-EZ systems for compatibility.

secureez_step1secureez_step2secureez_step3
New or
additional setup
Choosing and
answering questions
Resulting key
The four questions are mother's maiden name, birthday, the name of a first pet, or the name of the street on which an answerer grew up. Clever users can invent other answers to questions, of course, as long as they keep them consistent, such as using Einstein's birthday or a spouse's first pet--or even entering an unrelated word for mother's maiden name.

The first time you set up a router with SecureEZSetup, the key is stored in the router's configuration and in the local wireless adapter. The setup wizard allows you to save and print the information you entered, including the long hexadecimal key, for reference in configuring addition machines. The setup also assigns a unique SSID (network name) to the Wi-Fi gateway based on that gateway's MAC address.

SecureEZSetup has some similarities with Buffalo Technology's AOSS (AirStation OneTouch Secure System) which requires all Buffalo hardware to negotiate a lowest-common denominator encryption setting for the network. A Buffalo spokesperson said via email that Buffalo would support both systems, and allow their customers to choose whether to select AOSS or SecureEZSetup.

Jeff Abramowitz, senior director of marketing for wireless LAN technology, said that their customers, which integrate Broadcom chips into consumer and enterprise products, would start rolling out EZ into products as soon as in the next month, but more likely in upgrades destined for before the back-to-school period. He declined to say which companies initially plan support. Abramowitz said that the algorithm that drives the setup would be made available to incorporate into a standard, and that the front-end would be backward compatible for all of their shipping equipment.

Because the algorithm hasn't been open to public scrutiny, the possibility remains that a cracker could discover a method to precompute in finite time all or most possible keys based on all reasonable length answers to the four questions in each combination. Because WPA-PSK (pre-shared key) can be forced to reveal known data encrypted with the key that a cracker can then take and work on elsewhere, it is open to a dictionary attack. If the number of precomputed keys is sufficiently small to store (on the order of megabytes, not tens of gigabytes), there's the potential of a cracker using this algorithm to his or her advantage. I'm sure the encryption community will have more to say about this when their hashing algorithm hits the light of day.

Broadcom chose to deal with the application level of this problem because of the current obscurity in enabling encryption. "In most cases, I think the people that we've talked to they look at these screens and disable security," Abramowitz said. The company ships 71 percent of all 802.11g products at the retail level, he said, making it possible for them to roll out this new initiative and see significant uptake.

Abramowitz also noted that the EZ system could piggyback in the future on an initiative that Microsoft is working on to allow secure exchange of keys and other material through a USB flash drive. In that system, the user could generate the key on one machine, write it to the drive, and then use that to load the key on other systems. Microsoft employed a floppy drive version of that idea to distribute keys on their home wireless routers first generation. Broadcom is concerned that any distribution method for the keys is secure. "If it's not secure, then we've just blown half of the value," he said.

SecureEZSetup defeats two common problems with Wi-Fi security: first, convincing users to enable it by avoiding a WEP-like screen. Even Apple's relatively simple interface for entering a security key on their gateway requires the user to choose from one of four options, including the non-standards-named WPA Personal and WPA Enterprise (WPA-PSK and WPA over RADIUS, respectively).

Second, because Broadcom generates a long WPA key, they avoid the WPA key weakness which would allow a key that is comprised entirely of dictionary words and is 20 characters or fewer in length potentially to be broken through an offline attack. (No documented software exists that performs this crack, but it's not an issue of when but if since the weakness is well documented.)

Broadcom is also introducing a new chipset that combines and reconfigures some elements of their radio and processing circuitry to reduce the cost of manufacture while extending range. The tradeoff for range is speed, but Abramowitz said that users are willing to exchange more distance for lower speed because the speed is typically far above the home broadband connection speed.

Abramowitz promised future developments of a similar nature to improve Wi-Fi's usability by home users. This is "the first of what we expect will be several deliveries by us to advance state-of-the-art Wi-Fi connectivity."