How do we know the AuthKey in Pixie Dust attack?
I’ve been reading about the Pixie Dust attack from various sources, that provide a low-level explanation of how it works.
In the values
E-Hash1 = HMAC(AuthKey, E-S1 || PSK1 || PKE || PKR)
and
E-Hash2 = HMAC(AuthKey, E-S2 || PSK2 || PKE… Continue reading How do we know the AuthKey in Pixie Dust attack?