On Sun, Sep 20, 2015 at 6:38 PM, James Knott
On 09/20/2015 05:30 PM, Anton Aylward wrote:
Of course WPA2 uses AES for the
encryption, so if you can't crack the password, it will still take 139 trillion years to break the encryption. Are you actually "breaking" the encryption algorithmically or are you generating the set of all possible combinations and trying them one by one?
Brute force, trying all combinations. I'll let you know when I'm done. ;-)
Not necessary relevant, but WPA uses PBKDF2 as part of the authentication process. PBKDF2 is intentionally incredibly slow to make brute forcing harder. With a strong password, you would need some serious computing power to do it in a reasonable time-frame. Brandon Vincent -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org