
Notes:
Passive attacks to decrypt traffic based on statistical analysis.
Active attack to inject new traffic from unauthorized mobile stations, based on known plaintext attack.
Active attacks to decrypt traffic, based on tricking the access point.
Dictionary-building attack - after analysis of some period's traffic, allows real-time decryption of all traffic.