This is the
talk page for discussing improvements to the
Wi-Fi Protected Access article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google ( books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: 1Auto-archiving period: 120 days |
This article is rated C-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||
|
I'd like to query this:
What feasible attacks exist for RC4 as used in WPA? I've found a discussion of weak passphrase choice, but that's not really the protocol's fault per se: [1]. — Matt 23:43, 10 Nov 2004 (UTC)
The references to Diceware seem totally out of place in this section. Diceware never appears in the IEEE standards, it is not a well adopted mechanism. The DiceWare 'strength' is used in place of the WiFi Alliance recommended practices and the abiity to use 64 char hex. —The preceding unsigned comment was added by 70.132.3.231 ( talk • contribs) 05:57, 7 February 2006 (UTC)
huge range from their last 41.223.96.181 ( talk) 18:52, 19 November 2023 (UTC)
Ma Sharda library 2409:4063:6D0A:14B9:0:0:E988:860D ( talk) 13:35, 14 March 2024 (UTC)