grimholtz;156691 Wrote: 
> Attacks against AES are transferrable to WPA if you use AES instead of
> TKIP (AES is preferred). Bottom line: by not using a cryptographically
> secure key for AES encryption, you are increasing the chances of a
> successful brute-force attack.
This isn't quite true. When attacking a WPA2-AES network you have two
choices - attack AES -or- attack WPA. Attacking AES requires you to
brute force (or otherwise derive) the session key (which is generated
for you by WPA and as far as I can tell is not dependent on the
security of your PSK). Attacking WPA directly will allow you to
authenticate as a legitimate client and get your own session key, this
negating the need to attack AES. 

Simply put: the PSK you generate & enter is not used as the AES key,
it's used to -protect- the AES key. Thus, I still don't believe it need
to be any more secure than is required to defeat a dictionary attack.


-- 
radish
------------------------------------------------------------------------
radish's Profile: http://forums.slimdevices.com/member.php?userid=77
View this thread: http://forums.slimdevices.com/showthread.php?t=29934

_______________________________________________
discuss mailing list
[email protected]
http://lists.slimdevices.com/lists/listinfo/discuss

Reply via email to