05-12-2017, 02:55 PM
i was wondering is there any flaws in the wpa/2 algorithms that can allow cutting the cracking time because of a flaw that allows 1 hash to be generated from multiple passwords?
for example 1+2=3 and 2+1=3 you can get the same result by swapping the first adding digits and i know some hashes weak in that way.
i think the enigma machine was that way and was mentioned in the movie imitation game due to the wiring of the contacts on the encoder wheels it is possible to reduce the number of combinations to half or even 3rd.
or has the wifi standards hardened the wpa/2 against such weakness.
thanks
for example 1+2=3 and 2+1=3 you can get the same result by swapping the first adding digits and i know some hashes weak in that way.
i think the enigma machine was that way and was mentioned in the movie imitation game due to the wiring of the contacts on the encoder wheels it is possible to reduce the number of combinations to half or even 3rd.
or has the wifi standards hardened the wpa/2 against such weakness.
thanks