From Wikipedia, the free encyclopedia

Cleanup

The article is not clear. What are a and b? Where does IVs enter the picture? They are not mentioned in the algorithm description. Moreover, the article discusses only WEP. Does this attack apply only to WEP (in which case I think it should be renamed) or does it apply to RC4 in general?

Agreed. The pseudo code presented is only for RC4. Though RC4 is considered cryptographically broken - as the wiki page will attest - the vulnerability described in the article pertains to a particular implementation. It is really unclear how WEP uses IVs in conjunction with RC4. Moreover, what makes these IVs weak? How does it relate to RC4? I'm not an expert on the subject, so it would be nice for someone more knowledgeable than I to come clear this up. 76.165.248.106 ( talk) —Preceding undated comment added 05:41, 22 March 2009 (UTC). reply

There is a good summary of the attack in the RC4 article http://en.wikipedia.org/wiki/Rc4 -- Jbarcelo ( talk) 09:52, 17 February 2011 (UTC) reply

Female attacker

I like you naming the attacker "her"! /Jonas —Preceding unsigned comment added by 81.229.79.146 ( talk) 06:40, 7 December 2008 (UTC) reply

This is probably due to Alice_and_Bob. Arlo James Barnes 20:14, 3 March 2018 (UTC) reply
From Wikipedia, the free encyclopedia

Cleanup

The article is not clear. What are a and b? Where does IVs enter the picture? They are not mentioned in the algorithm description. Moreover, the article discusses only WEP. Does this attack apply only to WEP (in which case I think it should be renamed) or does it apply to RC4 in general?

Agreed. The pseudo code presented is only for RC4. Though RC4 is considered cryptographically broken - as the wiki page will attest - the vulnerability described in the article pertains to a particular implementation. It is really unclear how WEP uses IVs in conjunction with RC4. Moreover, what makes these IVs weak? How does it relate to RC4? I'm not an expert on the subject, so it would be nice for someone more knowledgeable than I to come clear this up. 76.165.248.106 ( talk) —Preceding undated comment added 05:41, 22 March 2009 (UTC). reply

There is a good summary of the attack in the RC4 article http://en.wikipedia.org/wiki/Rc4 -- Jbarcelo ( talk) 09:52, 17 February 2011 (UTC) reply

Female attacker

I like you naming the attacker "her"! /Jonas —Preceding unsigned comment added by 81.229.79.146 ( talk) 06:40, 7 December 2008 (UTC) reply

This is probably due to Alice_and_Bob. Arlo James Barnes 20:14, 3 March 2018 (UTC) reply

Videos

Youtube | Vimeo | Bing

Websites

Google | Yahoo | Bing

Encyclopedia

Google | Yahoo | Bing

Facebook