Duke mmi questions
Aug 21, 2001 · guaranteeing reuse, and leading to the same cryptanalytic attacks just described. The paper also shows that message authentication in WEP is broken. Fluhrer, Mantin, and Shamir describe a passive ciphertext-only attack against RC4 as used in WEP . The attack exploits the method in which the standard describes using IVs for the RC4 stream cipher.