Outline Introduction The WEP protocol Security goals Description Attacks involving keystream reuse The "Two-Time Pad" problem Decryption dictionaries Attacks involving message authentication Message modification Message injection Authentication spoofing Message decryption Countermeasures Lessons Conclusions