Weaknesses in the temporal key hash of WPA