<s>
The	O
bar	B-Protocol
mitzvah	I-Protocol
attack	I-Protocol
is	O
an	O
attack	O
on	O
the	O
SSL/TLS	B-Protocol
protocols	O
that	O
exploits	O
the	O
use	O
of	O
the	O
RC4	B-Algorithm
cipher	I-Algorithm
with	O
weak	O
keys	O
for	O
that	O
cipher	O
.	O
</s>
<s>
The	O
attack	O
uses	O
a	O
vulnerability	O
in	O
RC4	B-Algorithm
described	O
as	O
the	O
invariance	O
weakness	O
by	O
Fluhrer	O
et	O
al	O
.	O
</s>
<s>
in	O
their	O
2001	O
paper	O
on	O
RC4	B-Algorithm
weaknesses	O
,	O
also	O
known	O
as	O
the	O
FMS	O
attack	O
.	O
</s>
