View stunning SlideShares in full-screen with the new iOS app!Introducing SlideShare for AndroidExplore all your favorite topics in the SlideShare appGet the SlideShare app to Save for Later — even offline
View stunning SlideShares in full-screen with the new Android app!View stunning SlideShares in full-screen with the new iOS app!
Scott Fluhrer, Itsik Mantin and Adi Shamir; Weaknesses in the Key Scheduling Algorithm of RC4 , this paper presents several weaknesses in the key scheduling algorithm of RC4 and describes their cryptanalytic significance.
AirSnort one of the best-known WEP cracking tools, which employs the RC4 weaknesses to attack WLAN networks. AirSnort recovers encryption keys, operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.
Wireless LAN at Risk : An article that tells how easy can be to access a WLAN if even the minimal wireless security basics and precautions are not taken into account.
Sean Whalen , Analysis of WEP and RC4 Algorithms ; This paper explains briefly the WEP encryption mechanism and some ways to crack it.