Japanese researchers claim to have found a way to break the Wi-Fi Protected Access (WPA) encryption system used in wireless routers in just 60 seconds.
Toshihiro Ohigashi of Hiroshima University and Masakatu Morii of Kobe University plan to explain their method at a technical conference on 25 September in Hiroshima.
The attack potentially gives hackers a way to read encrypted traffic sent between computers and certain types of routers that use the WPA encryption system.
The fact that WPA could be broken has been known for some months, but the researchers have exploited a theoretical attack and made it practical.
An earlier technique, developed by researchers Martin Beck and Erik Tews, worked on a smaller range of WPA devices and took between 12 and 15 minutes.
Both attacks work on WPA systems that use the Temporal Key Integrity Protocol (TKIP) algorithm.
The WPA standard was originally designed as an interim encryption method as Wi-Fi security was developing, and has long since been superseded by WPA2. However, a fair bit of WPA with TKIP kit is still in use.
Newer WPA2 devices that use the stronger Advanced Encryption Standard algorithm remain safe for now.
Researchers crack WPA encryption in 60 seconds
By
V3.co.uk staff
on Aug 28, 2009 8:21AM

Got a news tip for our journalists? Share it with us anonymously here.
Partner Content

How NinjaOne Is Supporting The Channel As It Builds An Innovative Global Partner Program

Secure, integrated platforms enable MSPs to focus bringing powerful solutions to customers

Channel can help lead customers to boosting workplace wellbeing with professional headsets
Ingram Micro Ushers in the Age of Ultra

Build cybersecurity capability with award winning Fortinet training from Ingram Micro
Sponsored Whitepapers
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management

2025 State of Machine Identity Security Report