We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
State-of-the-art password authentication uses PAKE, which completely prevents bruteforcing passwords: https://en.wikipedia.org/wiki/Password-authenticated_key_agreement See also https://news.ycombinator.com/item?id=14842145
The suggestions to use scrypt or PBKDF2 (under The password can be cracked offline) are obsoleted by PAKE.
The text was updated successfully, but these errors were encountered:
Also WPA2 is already using PBKDF2 with 4096 iterations. As a minimum that sentence should be better worded.
Sorry, something went wrong.
It seems a PAKE protocol is finally going to be adopted by WPA3!
Previously [in WPA2], before a handshake could happen on a network, an attacker could do their guessing offline
Source: https://www.darkreading.com/endpoint/wi-fi-alliance-launches-wpa2-enhancements-and-debuts-wpa3/d/d-id/1330762
No branches or pull requests
State-of-the-art password authentication uses PAKE, which completely prevents bruteforcing passwords: https://en.wikipedia.org/wiki/Password-authenticated_key_agreement See also https://news.ycombinator.com/item?id=14842145
The suggestions to use scrypt or PBKDF2 (under The password can be cracked offline) are obsoleted by PAKE.
The text was updated successfully, but these errors were encountered: