First page Back Continue Last page Overview Graphics

WEP was the first effort


Notes:

Passive attacks to decrypt traffic based on statistical analysis.
Active attack to inject new traffic from unauthorized mobile stations, based on known plaintext attack.
Active attacks to decrypt traffic, based on tricking the access point.
Dictionary-building attack - after analysis of some period's traffic, allows real-time decryption of all traffic.