<html><head></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space; "><div>Could someone explain to me what is new here?</div><div><blockquote type="cite"><p>In their experiment, they carried out a brute force attack on the password protecting the WPA2 network and managed to succeed. According to their findings, the time needed to break into a system increases the longer the password used.</p></blockquote></div><div>The requirement for PSK keys to be long and random to resist brute forcing is well known.</div><div><blockquote type="cite"><p>The weakest point, the researchers believe, is the de-authentication step involved in the wireless setup.</p><p>As
part of their security protocols, routers using WPA2 must reconnect and
re-authenticate devices periodically and share a new key each time. The
team points out that the de-authentication step basically leaves a
backdoor unlocked albeit for a limited period. This period, however,
could be long enough for a fast-wireless scanner and a determined
intruder.</p></blockquote></div><div>The statement is "researchers believe" not "researchers have proven" or "researchers have demonstrated".</div><div><br></div><div>The Abstract is in the modern style, selling the paper rather than explaining what the paper adds to the field.</div><div><br></div><div>-glen</div></body></html>