WPA-PSK

The 32 to 256 bit passphrase that is salted w/the ssid and hashed into the 256 bit key.
Well, first off the SSID shouldnt be to hard to come by, least in most cases. So that just leaves the passphrase, which are most often ascii chars.
First approach) dict attack using SSID of target. Even with a very large dict should only take 10's of hours on decent hardware.
Second) Known SSID + bruteforce ascii passphrase (assuming about 72 diff chars)
keyspace: 72^64 - 72^8 = doh, thats not happenin
OK, turns out this doesnt matter
Passphrase keyspace = 512bit + SSID salt
This is then hashed down to the final 256bit key, Y, well to evenly spread out the ascii input into the keyspace.
SO, in short it would better to just bruteforce the RAW keyspace vs the passphrase. ( 2^256 << 72^64 )
So_how_long_is_64_charaters_anyway_um_well_quite_alot_actually_!
I think it would be safe to assume that anyone thats going to use an ascii (vs hex) passphrase will prolly only use part of the max, lets say half and see where that gets us.
new_keyspace: 72^32 - 72^8 = ~2.7x10^59 = 1 quadrillion machines @ 1 quadrillion K/s each for 2-3 yrs
Well, thats less than 2^256, but still not gonna work, hmmm, guess a simple bruteforce of the hex_keyspace would be fastest as all you need to do is a bunch of cmp's which would be faster than hashing & comparing the passphrases (minus the dict approach of course).
Well, first off the SSID shouldnt be to hard to come by, least in most cases. So that just leaves the passphrase, which are most often ascii chars.
First approach) dict attack using SSID of target. Even with a very large dict should only take 10's of hours on decent hardware.
Second) Known SSID + bruteforce ascii passphrase (assuming about 72 diff chars)
keyspace: 72^64 - 72^8 = doh, thats not happenin
OK, turns out this doesnt matter
Passphrase keyspace = 512bit + SSID salt
This is then hashed down to the final 256bit key, Y, well to evenly spread out the ascii input into the keyspace.
SO, in short it would better to just bruteforce the RAW keyspace vs the passphrase. ( 2^256 << 72^64 )
So_how_long_is_64_charaters_anyway_um_well_quite_alot_actually_!
I think it would be safe to assume that anyone thats going to use an ascii (vs hex) passphrase will prolly only use part of the max, lets say half and see where that gets us.
new_keyspace: 72^32 - 72^8 = ~2.7x10^59 = 1 quadrillion machines @ 1 quadrillion K/s each for 2-3 yrs
Well, thats less than 2^256, but still not gonna work, hmmm, guess a simple bruteforce of the hex_keyspace would be fastest as all you need to do is a bunch of cmp's which would be faster than hashing & comparing the passphrases (minus the dict approach of course).