The problem lies with the RC4s Key Scheduling Algorithm, which is derived from a secret key, and is used to convert messages into code. The researchers found that, under certain circumstances, this process is predictable and discovered that with WEP they could reverse the process, discover the secret key and decipher all messages.
http://www.newscientist.com/news/news.jsp?id=ns99991114
Wednesday, August 8, 2001
Popular Posts
-
Very dry, dull book with some basic financial info like ROI and cash flow. Not a lot here.
-
Some good stuff from a Canadian futurist: - The rising power of the knowledge worker - Continuous training replaces job security; respect is...
-
Not a bad audio book, but I expected more. Big ideas: Build a high performance, high-trust culture; Identify desired results and un...
-
Here's my (edited) journal entry for this event dated 12/01/98: Wow. I just sessioned and started reading "The Tao of Physics...
-
... or, Decemberween. Whatever. http://www.homestarrunner.com/xmas04.html
-
Peruvian archeologists have discovered the first full Inca burial site at Machu Picchu since the famous mountaintop citadel was discovered 9...
-
Increasingly, the overstretched and overburdened have a new answer to work lives of gunning harder for what seems like less and less: Dont j...
-
http://www.homestarrunner.com/sbemail94.html
-
http://esamultimedia.esa.int/images/marsexpress/377-260208-2149-6-co-01-HebesChasma_H1.jpg
-
Most mainstream music production relegates the computer to a behind-the-scenes player. The digital processes that help create the sense of p...