hashcat Forum

Full Version: wpa/2 flaws?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
i was wondering is there any flaws in the wpa/2 algorithms that can allow cutting the cracking time because of  a flaw that allows 1 hash to be generated from multiple passwords?

for example 1+2=3 and 2+1=3  you can get the same result by swapping the first adding digits and i know some hashes weak in that way.

i think the enigma machine was that way  and was mentioned in the movie imitation game  due to the wiring of the contacts on the encoder wheels it is possible to reduce the number of combinations to half or even 3rd.

or has the wifi standards hardened the wpa/2 against such weakness.

There's no such weakness in PBKDF2