Hi,
I made some researches about how WPA-PSK (using TKIP) and WPA2-PSK (using AES) are working. What I learned is that both produce a PMK (Pairwise Master Key) and a PTK (Pairwise Transient Key). This latter key is produced using, in
part, the PMK, the MAC address of both communicating systems, and random
values.
What I understand from those researches, it is that the AES algorithm seems to be more secure because the seed used to generate the random values (for the production of the PTK renewals) is changed more often than the seed in TKIP (using the RC4 algorithm).
Is that making sense?
If yes, how often this seed is changed in the AES compared to the TKIP (RC4)?
Thanks for having taken the time to read.
- essel
I made some researches about how WPA-PSK (using TKIP) and WPA2-PSK (using AES) are working. What I learned is that both produce a PMK (Pairwise Master Key) and a PTK (Pairwise Transient Key). This latter key is produced using, in
part, the PMK, the MAC address of both communicating systems, and random
values.
What I understand from those researches, it is that the AES algorithm seems to be more secure because the seed used to generate the random values (for the production of the PTK renewals) is changed more often than the seed in TKIP (using the RC4 algorithm).
Is that making sense?
If yes, how often this seed is changed in the AES compared to the TKIP (RC4)?
Thanks for having taken the time to read.
- essel
Comment