Results 1 to 4 of 4

Thread: ggnfs

  1. #1
    Just burned his ISO
    Join Date
    Aug 2009
    Posts
    3

    Default ggnfs

    After taking part in the TI calculator key factoring project (512bit RSA is now factorable in about a month on a i7) I began to wonder about applying a similar attack against WPA.

    Is there anything limiting the factoring of a WPA key?

  2. #2
    prowl3r
    Guest

    Default

    Quote Originally Posted by skittle View Post
    After taking part in the TI calculator key factoring project...
    What do you mean by taking part ? Are you B. Moody ?

  3. #3
    Just burned his ISO
    Join Date
    Aug 2009
    Posts
    3

    Default

    no, I sieved a large part of the 0a key

  4. #4
    Very good friend of the forum Gitsnik's Avatar
    Join Date
    Jan 2010
    Location
    The Crystal Wind
    Posts
    851

    Default

    Probably not - any weakness in the algorithyms will be in the sha1 algorithym - and before you jump to the thought of collisions, consider that the WPA key is hashed multiple times (4096 if memory serves) with the password and a few other bits and pieces (MAC address' if memory serves, among others), so any collision you find will have to be available to you from the very top.
    Still not underestimating the power...

    There is no such thing as bad information - There is truth in the data, so you sift it all, even the crap stuff.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •