Evilcry
04-14-2007, 05:00 AM
Hello Dear Community http://www.woodmann.com/forum/images/smilies/smile.gif
 
http://eprint.iacr.org/2007/120.pdf
 
Here you can find a new Attack to WEP, directly derived from Klein's Attack,
but with a foundamental advantage, this attack is extended such that is it possible to compute key bytes independently of each other
 
And as you can understand, time computation is drastically dropped down http://www.woodmann.com/forum/images/smilies/smile.gif
 
Hope this post will be useuful to someone http://www.woodmann.com/forum/images/smilies/smile.gif
 
Have a nice Day!
http://eprint.iacr.org/2007/120.pdf
Here you can find a new Attack to WEP, directly derived from Klein's Attack,
but with a foundamental advantage, this attack is extended such that is it possible to compute key bytes independently of each other
And as you can understand, time computation is drastically dropped down http://www.woodmann.com/forum/images/smilies/smile.gif
Hope this post will be useuful to someone http://www.woodmann.com/forum/images/smilies/smile.gif
Have a nice Day!