WEP Attack of Fluhrer, Mantin & Shamir

WEP encryption is based on an 8-byte key; the first three bytes are publicly visible and constitute the "initialization vector" IV, and the last five bytes are the secret portion (that is, Key[3]...Key[7]).

Suppose we know Key[0]...Key[N-1] and want to find Key[N]. (If N=3, the part we know is just the IV.) Given enough instances of a "weak" IV of the form <N, 255, X> together with the first byte of the resultant keystream Y, we can infer Key[N].

Enter N and your identifier, below, and you will get the list of all <X,Y> pairs.


Please select your initials (used to select a secret key):

What kind of magic do you want?

fnord quux foobar plugh xyzzy friday cowabunga please

Select N: N=3 N=4 N=5 N=6 N=7