I've been googling around to see if anyone else noticed this issue, but I'm only getting results from my other forum posts regarding this. Anyways, here is the deal...I thought that the [H] should know about it... This deals with the Apple AirPort Extreme (54n?) that my dad just bought, but probably applies to other past AirPort products as well... When you're setting up WEP protection, you get to set up a key. For 128bit encryption, you get to provide a 104bit key, which is equivalent to 26 hexadecimal characters or 13 ASCII characters. Since using ASCII severely limits available key combinations (whose keyboard can readily input null / extended characters - or type control characters into an input box?) you are usually presented with the input for 26 hexadecimal characters. Unless you use the AirPort Extreme... Then you are allowed to type in a "passphrase" that needs to be less than 13 characters long...see the issue? This "passphrase" is used directly as the key, and if your passphrase is shorter then the hexadecimal equivalent of your key is simply padded with x00's until it is the correct length. Other routers implement a different passphrase system as specified in 802.11b/g. As far as I know, Apple is the only one that I know of to dissent from the standard. This difference puts users of WEP encryption at greater possible risk - few people will come up with 13 characters because this maximum length is optional, and as a result a large portion of the key can simply be padded x00's... On one hand, since current WEP cracking depends on the IV's (and this is 24bits long) - this means that the passphrase of at least characters theoretically (but not practically since users can't input all ASCII characters) offers more combinations and would be a slower attack. But who knows if there is an attack that makes use of known parts of the key to speed up the process? Here is the original example passphrase / WEP key representation that I posted: Code: Passphrase: TheTazZone Apple Key: 54686554617A5A6F6E65000000 Standard Key: C536E9626A397395AF5329928A Anyways, I thought the [H] might be interested in knowing this. If you use an AirPort product, and used a WEP passphrase...you'll want to look into getting the "standard" key conversion for it at http://www.powerdog.com/wepkey.cgi - or you might just want to take some time to set up your own random hexadecimal key to make sure you're making full use of the available key space.