Talk:Fluhrer, Mantin and Shamir attack
The article is not clear. What are a and b? Where does IVs enter the picture? They are not mentioned in the algorithm description. Moreover, the article discusses only WEP. Does this attack apply only to WEP (in which case I think it should be renamed) or does it apply to RC4 in general?
Agreed. The pseudo code presented is only for RC4. Though RC4 is considered cryptographically broken - as the wiki page will attest - the vulnerability described in the article pertains to a particular implementation. It is really unclear how WEP uses IVs in conjunction with RC4. Moreover, what makes these IVs weak? How does it relate to RC4? I'm not an expert on the subject, so it would be nice for someone more knowledgeable than I to come clear this up. 126.96.36.199 (talk) —Preceding undated comment added 05:41, 22 March 2009 (UTC).