Chapter 4 WLAN Encryption Flaws