"The attack, described as the first practical attack on WPA,
will be discussed at the PacSec conference in Tokyo next week.
There, researcher Erik Tews will show how he was able to crack WPA
encryption, in order to read data being sent from a router to a
laptop computer. The attack could also be used to send bogus
information to a client connected to the router.
"To do this, Tews and his co-researcher Martin Beck found a way
to break the Temporal Key Integrity Protocol (TKIP) key, used by
WPA, in a relatively short amount of time: 12 to 15 minutes,
according to Dragos Ruiu, the PacSec conference's organizer."