evilcry
April 14th, 2007, 02:47
Hello Dear Community 
http://eprint.iacr.org/2007/120.pdf
Here you can find a new Attack to WEP, directly derived from Klein's Attack,
but with a foundamental advantage, this attack is extended such that is it possible to compute key bytes independently of each other
And as you can understand, time computation is drastically dropped down
Hope this post will be useuful to someone
Have a nice Day!

http://eprint.iacr.org/2007/120.pdf
Here you can find a new Attack to WEP, directly derived from Klein's Attack,
but with a foundamental advantage, this attack is extended such that is it possible to compute key bytes independently of each other
And as you can understand, time computation is drastically dropped down

Hope this post will be useuful to someone

Have a nice Day!