Quote:
Originally Posted by Mr Mephisto
Written another way, there are 29,010,624,113,146,182,337,306,275,467,414,000,000,000,000,000,000,000,000,000,000,000,000,000 values that would have to be analyzed to "crack" WPA. That normally take 3,679,683,423,788,201,717,060,664 years if you could analyze 25million fields a second (a reasonable value based upon today's CPUs). That's considerably longer than the Universe has existed.
You could reduce the time required by using a hybrid of hueristics, probability filtering and the so-called "fast memory trade-off technique". Who knows? You might get it down to a couple of Billion years.
Somehow I doubt you're gonna do it. :-)
And, of course, then there's always 802.11i which doesn't use WEP/WPA at all.
QED
Mr Mephisto
|
This argument only works if the very last possibilty is the one that works, and also assumes that your doing a brute force method of cracking on a single PC. What about distributed?
Where there's a will, there's a way.
Granted the security protocols are getting better as time goes by, but unless a network is completly isolated it will never be 100% secure. I think we can agree to that.
My personal network is set for mac filtering and wep is disabled. It keeps the honest people honest and I dont have to take a performance hit to keep wep up and running. Anyone that really wants into my network is going to get into it, but as soon as they do I'll know about it.
Quote:
So yeah... I guess you could say that it's not 100% secure. But I doubt you're gonna hack it mate. :-) You dont' seem to undestand the fundamental underlying cryptographic concepts.
|
I understand cyptography very well actually, There are more ways to break things than brute force methods, but thats not what this whole thing is about. You were telling everyone that it's possible to completly secure a wifi network and I was correcting you that it is not, you can come close to being completly secure but you can never achieve 100% security with any network.
also anyone that broadcasts a wifi signal without some sort of security on it is just begging to have uninvited guests on their network. And those people that choose to be the uninvited guests are neither hackers or thief's in any sense of the word, bump up the security so you have to work to get into it.. then you may be called a hacker.. once on the network and you steal things you do not have access to otherwise then your a thief. But to use bandwidth from someone else, your not a hacker.
to the original response, anything's possible but sometimes just not practical.