<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 25 Apr 2026 13:57:27 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Cryptography FM - Episodes Tagged with “Wi Fi”</title>
    <link>https://cryptography.fireside.fm/tags/wi-fi</link>
    <pubDate>Tue, 01 Jun 2021 14:00:00 +0200</pubDate>
    <description>Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>In-depth, substantive discussions on the latest news and research in applied cryptography.</itunes:subtitle>
    <itunes:author>Symbolic Software</itunes:author>
    <itunes:summary>Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cryptography</itunes:keywords>
    <itunes:owner>
      <itunes:name>Symbolic Software</itunes:name>
      <itunes:email>nadim@symbolic.software</itunes:email>
    </itunes:owner>
<itunes:category text="Science">
  <itunes:category text="Mathematics"/>
</itunes:category>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 17: Breaking Wi-Fi With Frame Attacks!</title>
  <link>https://cryptography.fireside.fm/17</link>
  <guid isPermaLink="false">d14ed975-7bb2-4d45-88dd-700f253f76c8</guid>
  <pubDate>Tue, 01 Jun 2021 14:00:00 +0200</pubDate>
  <author>Symbolic Software</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/d14ed975-7bb2-4d45-88dd-700f253f76c8.mp3" length="51797390" type="audio/mpeg"/>
  <itunes:episode>17</itunes:episode>
  <itunes:title>Episode 17: Breaking Wi-Fi With Frame Attacks!</itunes:title>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Symbolic Software</itunes:author>
  <itunes:subtitle>Mathy Vanhoef breaks Wi-Fi security yet again, with a new frame aggregation attack that affects all Wi-Fi encryption standards since 1997 and up to today.</itunes:subtitle>
  <itunes:duration>35:58</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"/>
  <description>Wi-Fi is a pretty central technology to our daily lives, whether at home or at the office. Given that so much sensitive data is regularly exchanged between Wi-Fi devices, a number of standards have been developed to ensure the privacy and authentication of Wi-Fi communications.
However, a recent paper shows that every single Wi-Fi network protection standard since 1997, from WEP all the way to WPA3, is exposed to a critical vulnerability that allows the exfiltration of sensitive data. How far does this new attack go? How does it work? And why wasn’t it discovered before? We’ll discuss this and more in this episode of Cryptography FM.
Links and papers discussed in the show:
* Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation (https://papers.mathyvanhoef.com/usenix2021.pdf)
* Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd (https://papers.mathyvanhoef.com/dragonblood.pdf)
* Release the Kraken: New KRACKs in the 802.11 Standard (https://papers.mathyvanhoef.com/ccs2018.pdf)
Music composed by Toby Fox and performed by Sean Schafianski (https://seanschafianski.bandcamp.com/). Special Guest: Mathy Vanhoef.
</description>
  <itunes:keywords>wi-fi</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Wi-Fi is a pretty central technology to our daily lives, whether at home or at the office. Given that so much sensitive data is regularly exchanged between Wi-Fi devices, a number of standards have been developed to ensure the privacy and authentication of Wi-Fi communications.</p>

<p>However, a recent paper shows that every single Wi-Fi network protection standard since 1997, from WEP all the way to WPA3, is exposed to a critical vulnerability that allows the exfiltration of sensitive data. How far does this new attack go? How does it work? And why wasn’t it discovered before? We’ll discuss this and more in this episode of Cryptography FM.</p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://papers.mathyvanhoef.com/usenix2021.pdf" rel="nofollow">Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation</a></li>
<li><a href="https://papers.mathyvanhoef.com/dragonblood.pdf" rel="nofollow">Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd</a></li>
<li><a href="https://papers.mathyvanhoef.com/ccs2018.pdf" rel="nofollow">Release the Kraken: New KRACKs in the 802.11 Standard</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guest: Mathy Vanhoef.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://capsule.join.com/jobs/2329486-backend-engineer-with-cryptography-and-decentralized-tech-experience">Capsule Social</a>: <a rel="nofollow" href="https://capsule.join.com/jobs/2329486-backend-engineer-with-cryptography-and-decentralized-tech-experience">At Capsule Social, Inc. we are building a platform for decentralized discourse. A place where content creators, writers, and thinkers have full ownership and control over their speech, and enjoy resilience from censorship and takedowns.

Capsule Social is hiring decentralized technology engineers, and we'd be thrilled for you to apply.</a></li></ul><p>Links:</p><ul><li><a title="Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation" rel="nofollow" href="https://papers.mathyvanhoef.com/usenix2021.pdf">Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation</a> &mdash; In this paper, we present three design flaws in the 802.11 standard that underpins Wi-Fi. One design flaw is in the frame aggregation functionality, and another two are in the frame fragmentation functionality. These design flaws enable an adversary to forge encrypted frames in various ways, which in turn enables exfiltration of sensitive data. We also discovered common implementation flaws related to aggregation and fragmentation, which further worsen the impact of our attacks. Our results affect all protected Wi-Fi networks, ranging from WEP all the way to WPA3, meaning the discovered flaws have been part of Wi-Fi since its release in 1997. In our experiments, all devices were vulnerable to one or more of our attacks, confirming that all Wi-Fi devices are likely affected. Finally, we present a tool to test whether devices are affected by any of the vulnerabilities, and we discuss countermeasures to prevent our attacks.</li><li><a title="Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd" rel="nofollow" href="https://papers.mathyvanhoef.com/dragonblood.pdf">Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd</a> &mdash; We systematically analyze WPA3 and EAP-pwd, find denial-of- service and downgrade attacks, present severe vulnerabilities in all implementations, reveal side-channels that enable offline dictionary attacks, and propose design fixes which are being officially adopted.</li><li><a title="Release the Kraken: New KRACKs in the 802.11 Standard" rel="nofollow" href="https://papers.mathyvanhoef.com/ccs2018.pdf">Release the Kraken: New KRACKs in the 802.11 Standard</a> &mdash; We improve key reinstallation attacks (KRACKs) against 802.11 by generalizing known attacks, systematically analyzing all hand- shakes, bypassing 802.11’s official countermeasure, auditing (flawed) patches, and enhancing attacks using implementation-specific bugs.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Wi-Fi is a pretty central technology to our daily lives, whether at home or at the office. Given that so much sensitive data is regularly exchanged between Wi-Fi devices, a number of standards have been developed to ensure the privacy and authentication of Wi-Fi communications.</p>

<p>However, a recent paper shows that every single Wi-Fi network protection standard since 1997, from WEP all the way to WPA3, is exposed to a critical vulnerability that allows the exfiltration of sensitive data. How far does this new attack go? How does it work? And why wasn’t it discovered before? We’ll discuss this and more in this episode of Cryptography FM.</p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://papers.mathyvanhoef.com/usenix2021.pdf" rel="nofollow">Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation</a></li>
<li><a href="https://papers.mathyvanhoef.com/dragonblood.pdf" rel="nofollow">Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd</a></li>
<li><a href="https://papers.mathyvanhoef.com/ccs2018.pdf" rel="nofollow">Release the Kraken: New KRACKs in the 802.11 Standard</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guest: Mathy Vanhoef.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://capsule.join.com/jobs/2329486-backend-engineer-with-cryptography-and-decentralized-tech-experience">Capsule Social</a>: <a rel="nofollow" href="https://capsule.join.com/jobs/2329486-backend-engineer-with-cryptography-and-decentralized-tech-experience">At Capsule Social, Inc. we are building a platform for decentralized discourse. A place where content creators, writers, and thinkers have full ownership and control over their speech, and enjoy resilience from censorship and takedowns.

Capsule Social is hiring decentralized technology engineers, and we'd be thrilled for you to apply.</a></li></ul><p>Links:</p><ul><li><a title="Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation" rel="nofollow" href="https://papers.mathyvanhoef.com/usenix2021.pdf">Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation</a> &mdash; In this paper, we present three design flaws in the 802.11 standard that underpins Wi-Fi. One design flaw is in the frame aggregation functionality, and another two are in the frame fragmentation functionality. These design flaws enable an adversary to forge encrypted frames in various ways, which in turn enables exfiltration of sensitive data. We also discovered common implementation flaws related to aggregation and fragmentation, which further worsen the impact of our attacks. Our results affect all protected Wi-Fi networks, ranging from WEP all the way to WPA3, meaning the discovered flaws have been part of Wi-Fi since its release in 1997. In our experiments, all devices were vulnerable to one or more of our attacks, confirming that all Wi-Fi devices are likely affected. Finally, we present a tool to test whether devices are affected by any of the vulnerabilities, and we discuss countermeasures to prevent our attacks.</li><li><a title="Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd" rel="nofollow" href="https://papers.mathyvanhoef.com/dragonblood.pdf">Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd</a> &mdash; We systematically analyze WPA3 and EAP-pwd, find denial-of- service and downgrade attacks, present severe vulnerabilities in all implementations, reveal side-channels that enable offline dictionary attacks, and propose design fixes which are being officially adopted.</li><li><a title="Release the Kraken: New KRACKs in the 802.11 Standard" rel="nofollow" href="https://papers.mathyvanhoef.com/ccs2018.pdf">Release the Kraken: New KRACKs in the 802.11 Standard</a> &mdash; We improve key reinstallation attacks (KRACKs) against 802.11 by generalizing known attacks, systematically analyzing all hand- shakes, bypassing 802.11’s official countermeasure, auditing (flawed) patches, and enhancing attacks using implementation-specific bugs.</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
