A new attack developed by a pair of Japanese researchers will allow an attacker to intercept certain packets, but won't give them access to the encryption key. This new attack on the WiFi Protected Access encryption scheme improves on a previous attack developed by a German team. The previous attack took nearly 15 minutes, but this one can be executed in around 1 minute. The attack will work on any WPA network using TKIP encryption. The attack is executed by acting as a wireless access point, and passing the packets from the computer to the real wireless access point. The attacker can then send falsified packets to the wireless access point and they will appear to be completely legit.