ICE
Related-key attack
Fluhrer
Mantin and Shamir attack
Wired Equivalent Privacy
Stream cipher
Initialization vector
Weak key
Cryptography
RC4
Permutation