in reply to Re^12: Password strength calculation
in thread Password strength calculation
Don't believe the hype.
Sorry, but you are out of date. There is no hype. It is not just NTLM that is vulnerable to GPU attacks. Vis.
And that means your "100 ms of hashing" is no defence either, because WPA2 uses:
Pre-shared key mode (PSK, also known as Personal mode) is designed for home and small office networks that don't require the complexity of an 802.1X authentication server.9 Each wireless network device encrypts the network traffic using a 256 bit key. This key may be entered either as a string of 64 hexadecimal digits, or as a passphrase of 8 to 63 printable ASCII characters.10 If ASCII characters are used, the 256 bit key is calculated by applying the PBKDF2 key derivation function to the passphrase, using the SSID as the salt and 4096 iterations of HMAC-SHA1.
I think we are done now.
|
|---|