Log in
Register
Home
Forums
New posts
Search forums
What's new
Featured content
New posts
New profile posts
Latest activity
News
Members
Current visitors
New profile posts
Search profile posts
Features
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
New posts
Search forums
Menu
Install the app
Install
Reply to thread
Home
Forums
Off Topic
The Basement
How secure are
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Message
<blockquote data-quote="Ryan Lantzy" data-source="post: 18156" data-attributes="member: 7"><p>Re: How secure are</p><p></p><p></p><p></p><p></p><p></p><p>WPA2 PSK is pretty much infailable if AES is used and a truely random 256bit key. TKIP (an alternative encryption scheme supported by WPA) has been compromised by a flaw found by some researchers.</p><p></p><p></p><p></p><p>To thwart brute force attempts, a non-dictionary set of random charcaters should be used for the passphrase if a true 256bit key is not being used (64 ascii characters). Another good measure is to not use a common name for the wireless access point SSID if using a passphrase. The 256bit key is generated via an algorithm using the phasphrase and SSID.</p><p></p><p></p><p></p><p>Other protections, hide the SSID (don't broadcast) and enable MAC address filtering.</p></blockquote><p></p>
[QUOTE="Ryan Lantzy, post: 18156, member: 7"] Re: How secure are WPA2 PSK is pretty much infailable if AES is used and a truely random 256bit key. TKIP (an alternative encryption scheme supported by WPA) has been compromised by a flaw found by some researchers. To thwart brute force attempts, a non-dictionary set of random charcaters should be used for the passphrase if a true 256bit key is not being used (64 ascii characters). Another good measure is to not use a common name for the wireless access point SSID if using a passphrase. The 256bit key is generated via an algorithm using the phasphrase and SSID. Other protections, hide the SSID (don't broadcast) and enable MAC address filtering. [/QUOTE]
Insert quotes…
Verification
Post reply
Home
Forums
Off Topic
The Basement
How secure are
Top
Bottom
Sign-up
or
log in
to join the discussion today!