this post was submitted on 22 Feb 2026
8 points (90.0% liked)
Cryptography @ Infosec.pub
610 readers
1 users here now
Questions, answers, discussions, and literature on the theory and practice of cryptography
Rules (longer version here)
- Stick to cryptography / infosec
- Be a good netizen - be kind, act in good faith, maintain high quality, don't mislead
- Link directly to original sources
- Don't use us to cheat on challenges or tests!
- Crypto review requests must show the algorithm
- CTF / challenges and puzzles must use modern crypto
- Avoid making duplicate posts
- All use of AI / LLM and their prompts MUST be disclosed in your submissions and comments
##Related resources;
- Reddit cryptography forums 1 & 2; /r/crypto /r/cryptography
- Cryptology ePrint archive
- Discussion site for ePrint papers
- Libera Chat's IRC:s #crypto - (IRC protocol URL)
- Metzdowd cryptography mailing list
- Randombit cryptography mailing list
- StackExchange cryptography community
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I'm assuming this is the same type of attack as against WiFi passwords in general, bruteforce of weak passwords. But otherwise yes, a PAKE algorithm instead for auth would completely prevent the ability to bruteforce based on watching traffic alone, and WPA3 already uses a PAKE and it should be used for everything which could be low entropy