The problem lies with the RC4s Key Scheduling Algorithm, which is derived from a secret key, and is used to convert messages into code. The researchers found that, under certain circumstances, this process is predictable and discovered that with WEP they could reverse the process, discover the secret key and decipher all messages.
http://www.newscientist.com/news/news.jsp?id=ns99991114
Wednesday, August 8, 2001
Popular Posts
-
In a mine in California, scientists found the smallest bacteria so far discovered -- living in conditions as acidic as battery acid. Why thi...
-
Brad Dalton is the first to admit his theory is far-fetched: that bacteria could account for odd light emissions, as well as the reddish hue...
-
I had the pleasure to attend the IBM Think conference in wet and chilly San Fran from Feb 11-14th of this year. The event overall was ...
-
Very dry, dull book with some basic financial info like ROI and cash flow. Not a lot here.
-
It's been almost exaclty three years since I've updated this blog. In that three years, I've achieved a lot -- I've gone aft...
-
Some good stuff from a Canadian futurist: - The rising power of the knowledge worker - Continuous training replaces job security; respect is...
-
Here's my (edited) journal entry for this event dated 12/01/98: Wow. I just sessioned and started reading "The Tao of Physics...
-
The secret papers obtained from the US military give an insight into an astonishing chain of events sparked by UFO sightings over East Angli...
-
Somewhere along the way I learned about this magic trick. It was probably from one of those “Owl” magazines you used to get for free or an e...
-
Nother confirmation Of einstein... the first images of light escaping a black hole show that they lose energy. In this case, it was a superm...