WPA Wi-Fi Encryption Cracked In Sixty Seconds

WPA-TKIP Encryption

(PhysOrg.com) -- Two Japanese computer scientists have developed a way to crack the WPA encryption between wireless routes and devices in 60 seconds.

Using this attack method, hackers can read encrypted data sent between wireless routers and computers. These attacks only work when a router's wireless security is set for WPA using Temporal Key Integrity Protocol (TKIP) .

About a year ago security researchers explained how WPA could be cracked. The Japanese computer scientists took this theoretical approach and turned it into reality. All this is explained in a paper that was presented at the Joint Workshop on Information Security that was held in Kaohsiung, Taiwan this month.

These attacks can be avoided by using the more recent WPA2 or WPA systems that use a stronger algorithm, AES (Advanced Encryption Standard).

Wireless routers have a long history of security problems that started back in 1997, when the Wired Equivalent Privacy (WEP) system was first introduced. Two years latter WEP was cracked and rendered useless as an effective security option.

WPA with TKIP was meant to be an interim encryption method for security until a stronger algorithm was developed. Going forward the use of WPA2 should be the standard method for Wi-Fi security. As of March 2006, WPA2 has been certified in wireless router.

Going forward users today should use either WPA2 or WPA with AES encryption in their wireless router.

Via: TechWatch

© 2009 PhysOrg.com

Citation: WPA Wi-Fi Encryption Cracked In Sixty Seconds (2009, August 28) retrieved 9 November 2024 from https://phys.org/news/2009-08-wpa-wi-fi-encryption-sixty-seconds.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.

Explore further

The Final 'Final' Nail in WEP's Coffin?

0 shares

Feedback to editors