The problem lies with the RC4s Key Scheduling Algorithm, which is derived from a secret key, and is used to convert messages into code. The researchers found that, under certain circumstances, this process is predictable and discovered that with WEP they could reverse the process, discover the secret key and decipher all messages.
http://www.newscientist.com/news/news.jsp?id=ns99991114
Wednesday, August 8, 2001
Popular Posts
-
... or, Decemberween. Whatever. http://www.homestarrunner.com/xmas04.html
-
It's been almost exaclty three years since I've updated this blog. In that three years, I've achieved a lot -- I've gone aft...
-
Here's my (edited) journal entry for this event dated 12/01/98: Wow. I just sessioned and started reading "The Tao of Physics...
-
Very dry, dull book with some basic financial info like ROI and cash flow. Not a lot here.
-
"The fish was delish and it made quite a dish." http://www.homestarrunner.com/sbemail120.html
-
After a year of hell, I've been given a reprieve. I've spent the last year dealing with contracts, negotiation, budgeting, and confl...
-
Not a bad audio book, but I expected more. Big ideas: Build a high performance, high-trust culture; Identify desired results and un...
-
Kids sick. Hiyat sick. Me sick. Everybody sick. No fun. Seriously. Zack just gets over having baby measels and everybody in the house co...
-
I'm sure someone else has written the rules of business out in terms of the Bushido, but here's my take: Truthfulness You must speak...
-
Somewhere along the way I learned about this magic trick. It was probably from one of those “Owl” magazines you used to get for free or an e...