facebook rss twitter

WPA encryption broken in 60 seconds.

by Tarinder Sandhu on 28 August 2009, 11:46

Tags: HEXUS

Quick Link: HEXUS.net/qatqf

Add to My Vault: x

Feeling confident that your wireless connection is safe from prying eyes? That may not be the case for WiFi-Protected Access (WPA), as Japanese researchers have shown a way of breaking the encryption within 60 seconds, writes James Sherwood of The Register.

Networking nerds claim to have devised a way of breaking Wi-Fi Protected Access (WPA) encryption within 60 seconds.

The technique, developed by Toshihiro Ohigashi of Hiroshima University and Masakatu Morii of Kobe University, is based on the established Becks-Tews method, which involves making minor changes to packets encrypted with TKIP - Temporal Key Integrity Protocol, a WPA security mechanism - and then sending those packets back to the access point.

However, the Becks-Tews method is known to take anywhere between 10 and 15 minutes to execute.

In a recently released paper, Ohigashi and Morii proposed a man-in-the-middle style of attack – also used by the Beck-Tews approach – in which a user’s communication is intercepted by an attacker.

This approach carries a high risk of detection, the pair admitted, so being able to shorten the attack time down to less than one minute is a major advantage – to potential hackers, at least.

Ohigashi’s and Morii’s technique doesn’t work in WPA 2 – the AES-based successor to WPA.

The pair will formally unveil their technique at a conference in Hiroshima, Japan, late next month.



HEXUS Forums :: 23 Comments

Login with Forum Account

Don't have an account? Register today!
Nothing new really, TKIP has been vulnerable for some time now.
I'm still using wired and am a noob to wireless/networking, how secure are these things?
Good job im on WPA2 then, feel like sharing the how to lol
UseItNow
I'm still using wired and am a noob to wireless/networking, how secure are these things?

AES is hard as nails. To the point that nobody has any theoretical attack for breaking it. See: http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
Just select WPA2-AES on your router and you're fine. As mentioned TKIP has been known vulnerable for a while.