Evilcry
04-14-2007, 05:00 AM
Hello Dear Community http://www.woodmann.com/forum/images/smilies/smile.gif
http://eprint.iacr.org/2007/120.pdf
Here you can find a new Attack to WEP, directly derived from Klein's Attack,
but with a foundamental advantage, this attack is extended such that is it possible to compute key bytes independently of each other
And as you can understand, time computation is drastically dropped down http://www.woodmann.com/forum/images/smilies/smile.gif
Hope this post will be useuful to someone http://www.woodmann.com/forum/images/smilies/smile.gif
Have a nice Day!
http://eprint.iacr.org/2007/120.pdf
Here you can find a new Attack to WEP, directly derived from Klein's Attack,
but with a foundamental advantage, this attack is extended such that is it possible to compute key bytes independently of each other
And as you can understand, time computation is drastically dropped down http://www.woodmann.com/forum/images/smilies/smile.gif
Hope this post will be useuful to someone http://www.woodmann.com/forum/images/smilies/smile.gif
Have a nice Day!