I'm not asking for a complete guide on how to do it, and my math/programming skills aren't up to that kind of work anyway.
I'm asking for a ballpark figure here, so I'll use a metaphor :
Is the Authenticator as safe as WEP or WPA2?
WEP can be hacked in less than 5 minutes if you have the software to do so.
WPA2 can be hacked, in theory, but in reality it would take months to compute and try out all the combo's.
|