Expert on a minute to kill Wi-Fi's method analysis of WPA encryption system

Source: Internet
Author: User
Keywords WPA encryption System
Tags access analysis computer crack developed hackers kill router
The following article is mainly about the security experts to kill Wi-Fi in a minute of the WPA encryption system, August 28 news, Japan's two security experts said they have developed a wireless router in a minute to break the WPA encryption system method. This attack provides hackers with the means to encrypt traffic between the computer and the routers that use WPA (Wi-Fi Protected Access) encryption systems. The attack was developed by two academics from Toshihiro Ohigashi of Hiroshima University, Japan, and Masakatu Morii of Kobe University, who are preparing to discuss the attack more thoroughly at a technical meeting held in Hiroshima on September 25. Last November, security researchers first disclosed a way to crack down on WPA, but Japanese academics have elevated the attack to new levels, said Dragos Ruiu, the organizer of the Pacsec security conference. "They have made it even more practical to do something that was quite theoretical at the time," he said. Two Japanese academics discussed the method in their paper, which was first read at the Joint Information Security Symposium (joint Workshop on Information), held in Kaohsiung, Taiwan, China, earlier this month. Last November's crack attack was developed by researchers Martin Beck and Erik Tews, which took about 12-15 minutes to complete the crack attack. Both of these attacks are only for WPA systems that use the TKIP (Temporary Key Integrity Protocol) algorithm, but are not effective for devices that have a newer WPA 2 system or that use a better cryptographic AES algorithm. The encryption system used by wireless routers has long been a security problem. The WEP (Wired Equivalent Privacy protection) system that emerged in 1997 was cracked several years later and was considered by security experts to be fundamentally unsafe. The WPA system, which uses the TKIP algorithm, "is only developed as a transitional encryption method," said Kelly Davis-felner, marketing manager for Wi-Fi Alliance. In her view, it would be better to use WPA 2. Enterprise-Class Wi-Fi networks typically have security software to detect man-in-the-middle attacks described by Japanese academics, said Errata Security's CEO Robert Graham. But the real and practical attack on WPA that the Japanese scholar has developed this time may give the enterprise reason to completely discard the TKIP algorithm's WPA system. "WPA is not as bad as WEP, but it's Dora," Graham said. "Users can switch from TKIP to AES using the management interface provided in many WPA routers. So as to ensure the safety of wireless networks. The above content is the security experts in a minute to kill Wi-Fi in the WPA encryption system Introduction, hope you can have some harvest. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' height= ' 309 ' alt= ' expert on a one-minute kill Wi-Fi WPA encryption System method Analysis "width = "450" border= "0" src= "http://images.51cto.com/files/uploadimg/20100926/1650580.jpg"/> The above related content is for security experts: In a minute you can kill Wi-Fi WPA encryption system description, hope will give you some help in this respect. "Responsible editor: Sun Chaohua TEL: (010) 68476606" Original: Expert for a minute to kill Wi-Fi WPA encryption system method analysis return to network security home

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.