Sciweavers

2 search results - page 1 / 1
» Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
Sort
View
NDSS
2002
IEEE
13 years 7 months ago
Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent paper by Fluhrer, Mantin, and Shamir. With our imp...
Adam Stubblefield, John Ioannidis, Aviel D. Rubin
SACRYPT
2001
Springer
123views Cryptology» more  SACRYPT 2001»
13 years 6 months ago
Weaknesses in the Key Scheduling Algorithm of RC4
Abstract. Inthis paper we present several weaknesses in the keyscheduling algorithm of RC4, and describe their cryptanalytic signi cance. We identify a large number of weak keys, i...
Scott R. Fluhrer, Itsik Mantin, Adi Shamir