grimholtz;156606 Wrote: 
> Software and most hardware is only capable of generating pseudo-random
> numbers. These are not truly random and often aren't cryptographically
> secure.

I know. The PRNG used to generate a WPA key has no need to be
cryptographically secure. The difference between pseudo- and
really-random numbers is only exploitable if the attacker has some
knowledge of the PRNG used and ideally a large sample of output so they
can predict sequential values. In this example they don't have either,
they have a stream which is encrypted using a single value from the
PRNG as key - that's not enough to exploit the PRNG. 

There's currently no known attack against WPA which is better than
brute force, and provided your key isn't in a dictionary then any value
is as good as any other (of the same entropy). What matters is that the
key you use is long enough and contains enough entropy, and isn't in
any dictionary (or isn't generatable based on a dictionary
transformation).


-- 
radish
------------------------------------------------------------------------
radish's Profile: http://forums.slimdevices.com/member.php?userid=77
View this thread: http://forums.slimdevices.com/showthread.php?t=29934

_______________________________________________
discuss mailing list
[email protected]
http://lists.slimdevices.com/lists/listinfo/discuss

Reply via email to