Explore the vulnerabilities of Wired Equivalent Privacy (WEP) encryption in this 46-minute Black Hat USA 2001 conference talk by Tim Newsham. Delve into the reasons for performing dictionary attacks on WEP and understand the intricacies of WEP encryption and authentication. Examine the flaws in 64-bit and 128-bit key generators, including reduced entropy due to ASCII mapping and PRNG use. Learn about the structure and implementation of a WEP cracker, including packet collection, key guessing, and verification techniques. Discover the implications of these vulnerabilities and related work in the field. Gain valuable insights into the weaknesses of early wireless security protocols and their impact on network security.