Not sure I quite understand what you mean...do you have an article or something I can read that will explain it?
The long and the short of it is that the packets that are sent when using WEP give away enough about the key used to encrypt them, that after monitoring a few thousand (I think) packets, you can can reconstruct the key.


