Folks breaking into WEP-encrypted Wi-Fi networks has become a fact of life. That's why most knowledgeable users rely on WPA or WPA2 encryption systems instead. Bad news, though: PC World reports that a pair of security researchers have found a way to break into WPA networks in a frighteningly short amount of time.
According to PC World, Erik Tews and Martin Beck can break WPA Temporal Key Integrity Protocol keys by first getting the router to send them "large amounts of data." Then, the researchers rely on a "mathematical breakthrough" that lets them find a crack in only 12-15 minutes. On the upside, the researchers reportedly haven't found a way to crack keys that secure data going from other systems to the router.
Other WPA cracking techniques already exist, of course, but they're much slower—PC World points out that they hinge on brute-force dictionary cracking, which takes a significant amount of processing power and time as the cracker's system iterates through all possible keys.
Tews and Beck plan to reveal more about their new cracking technique at the PacSec conference in Tokyo next week. PacSec organizer Dragos Ruiu told PC World that Beck has already added "some of the code used in the attack" to the popular Aircrack-ng Wi-Fi cracking tool. (Thanks to TR reader Chris for the heads-up.)
|AMD's A4-5000 'Kabini' APU reviewed||84|
|Memorial Day Weekend Shortbread||42|
|Deal of the week: A 7850 1GB for $132, and other bargains||7|
|AMD introduces low-power Richland APUs for slim notebooks||60|
|Updated Kinect motion sensor coming to the PC next year||23|
|Intel promises 50% battery life gain for Haswell laptops||75|
|WHQL-certified GeForce 320.18 drivers now available||18|
|OCZ Vertex 450 SSD has 20-nm NAND, tweaked Indilinx controller||16|