The best way to Crack RC4 Encryption in WPA-TKIP and TLS

HTTPS protocol sucks

Security scientific study has created a better and feasible attack technique from the RC4 cryptographic algorithm that is still widespread to encrypt communications on-line.

Despite being earliest pens, RC4 (Rivest Cipher 4) continues to be the hottest cryptographic cipher implemented in lots of popular protocols, including:

SSL (Secure Socket Layer)
TLS (Transport Layer Security)
WEP (Wired Equivalent Privacy)
WPA (Wi-Fi Protected Access)
Microsoft�s RDP (Remote Desktop Protocol)
and additional

However, weaknesses in the algorithm have been discovered throughout the years, indicating the RC4 must be wiped on the internet. But, yet about 50% of most TLS visitors are currently protected using the RC4 encryption algorithm.

Now, the specific situation got more serious, when two Belgian security researchers demonstrated an even more practical attack against RC4, allowing an attacker to subsequently expose encrypted information inside a much shorter amount of time than once was possible.

Attack on RC4 with 94% Accuracy
HTTPS protocol sucks
An attack on RC4 demonstrated in 2013 required more than 2,000 hours to achieve. However, an even more successful attack was presented this year in March, which dedicated to password recovery attacks against RC4 in TLS and required about 312 to 776 hours to execute.