Talk:Wi-Fi Protected Access
This is the talk page for discussing improvements to the Wi-Fi Protected Access article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: 1Auto-archiving period: 4 months |
This article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||
|
Attacks on WPA
editI'd like to query this:
- However, it is not perfect; attacks remain feasible against RC4, even with large key and IV sizes.
What feasible attacks exist for RC4 as used in WPA? I've found a discussion of weak passphrase choice, but that's not really the protocol's fault per se: [1]. — Matt 23:43, 10 Nov 2004 (UTC)
Chop out DiceWare
editThe references to Diceware seem totally out of place in this section. Diceware never appears in the IEEE standards, it is not a well adopted mechanism. The DiceWare 'strength' is used in place of the WiFi Alliance recommended practices and the abiity to use 64 char hex. —The preceding unsigned comment was added by 70.132.3.231 (talk • contribs) 05:57, 7 February 2006 (UTC)
WPA4 is missing on article
editThey are some sources on Internet, which mean, the Intel wifi 7 card BE200NGW supports WPA4. — Preceding unsigned comment added by 178.8.194.41 (talk) 12:56, 4 July 2024 (UTC)