Compromising a WEP encryption