Open main menu

Talk:Fluhrer, Mantin and Shamir attack

WikiProject Cryptography / Computer science  (Rated Start-class, Low-importance)
This article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the quality scale.
 Low  This article has been rated as Low-importance on the importance scale.
Taskforce icon
This article is supported by WikiProject Computer science (marked as Low-importance).


The article is not clear. What are a and b? Where does IVs enter the picture? They are not mentioned in the algorithm description. Moreover, the article discusses only WEP. Does this attack apply only to WEP (in which case I think it should be renamed) or does it apply to RC4 in general?

Agreed. The pseudo code presented is only for RC4. Though RC4 is considered cryptographically broken - as the wiki page will attest - the vulnerability described in the article pertains to a particular implementation. It is really unclear how WEP uses IVs in conjunction with RC4. Moreover, what makes these IVs weak? How does it relate to RC4? I'm not an expert on the subject, so it would be nice for someone more knowledgeable than I to come clear this up. (talk) —Preceding undated comment added 05:41, 22 March 2009 (UTC).

There is a good summary of the attack in the RC4 article --Jbarcelo (talk) 09:52, 17 February 2011 (UTC)

Female attackerEdit

I like you naming the attacker "her"! /Jonas —Preceding unsigned comment added by (talk) 06:40, 7 December 2008 (UTC)

This is probably due to Alice_and_Bob. Arlo James Barnes 20:14, 3 March 2018 (UTC)
Return to "Fluhrer, Mantin and Shamir attack" page.