grimholtz;156606 Wrote: > Software and most hardware is only capable of generating pseudo-random > numbers. These are not truly random and often aren't cryptographically > secure.
I know. The PRNG used to generate a WPA key has no need to be cryptographically secure. The difference between pseudo- and really-random numbers is only exploitable if the attacker has some knowledge of the PRNG used and ideally a large sample of output so they can predict sequential values. In this example they don't have either, they have a stream which is encrypted using a single value from the PRNG as key - that's not enough to exploit the PRNG. There's currently no known attack against WPA which is better than brute force, and provided your key isn't in a dictionary then any value is as good as any other (of the same entropy). What matters is that the key you use is long enough and contains enough entropy, and isn't in any dictionary (or isn't generatable based on a dictionary transformation). -- radish ------------------------------------------------------------------------ radish's Profile: http://forums.slimdevices.com/member.php?userid=77 View this thread: http://forums.slimdevices.com/showthread.php?t=29934 _______________________________________________ discuss mailing list [email protected] http://lists.slimdevices.com/lists/listinfo/discuss
