Erik Tews was demonstrate the attack at the PacSec conference in Tokyo in mid November, cracking WPA encryption could be exploited to read data being sent from a router to laptop or sent bogus information to a client connected to the router, tews and co researcher martin beck found way to temporal key integrity protocol (TKIP) key which WPA uses in a relatively short 12 to 15 minutes.
In the particular attack, however they have not managed to crack the encryption keys used to secure data sent from the pc to the router. WPA widely used on today’s Wi-Fi networks is considered superior to the original WEP (wired equivalent privacy) standard.
Which most security professional now deem insecure. The process upgrading from WEP to WPA encryption when it experienced one of the most widely publicized data breaches in united states history, in which hundreds millions of credit card number were stolen over a two-year period, the new WPA2 standard is considered safe from the recently developed attack, everybody has been saying, go to WPA because WEP is broken.
If WPA is significantly compromised, it would be a blow for business customers who have been increasingly adopting it, although can use Wi-Fi technology such as WPA2 or virtual private network software that will protect them from this at track, many device will still connect to the network via WPA or even by way of the thoroughly cracked WEP standard