grimholtz;156691 Wrote: > Attacks against AES are transferrable to WPA if you use AES instead of > TKIP (AES is preferred). Bottom line: by not using a cryptographically > secure key for AES encryption, you are increasing the chances of a > successful brute-force attack. This isn't quite true. When attacking a WPA2-AES network you have two choices - attack AES -or- attack WPA. Attacking AES requires you to brute force (or otherwise derive) the session key (which is generated for you by WPA and as far as I can tell is not dependent on the security of your PSK). Attacking WPA directly will allow you to authenticate as a legitimate client and get your own session key, this negating the need to attack AES.
Simply put: the PSK you generate & enter is not used as the AES key, it's used to -protect- the AES key. Thus, I still don't believe it need to be any more secure than is required to defeat a dictionary attack. -- radish ------------------------------------------------------------------------ radish's Profile: http://forums.slimdevices.com/member.php?userid=77 View this thread: http://forums.slimdevices.com/showthread.php?t=29934 _______________________________________________ discuss mailing list [email protected] http://lists.slimdevices.com/lists/listinfo/discuss
