Running Etch now and managed to scrpae off 364k IV's. The rate wasnt high only about 100 to 250 IV's per second. I have set my own
64 bit key to e5d4c3b2a1. Without any options aircrack-ng would not decode, however with the -n64 option results were soon displayed:

aircrack-ng -n64 test_WEP.ivs

Aircrack-ng 0.9.1

[00:00:00] Tested 752 keys (got 364851 IVs)

KB depth byte(vote)
0 0/ 2 E5( 38) A7( 8) CE( 5) 0A( 3) 13( 3) 2A( 3) 8C( 3) C5( 3) D2( 3) 01( 0) 06( 0)
1 1/ 9 5C( 32) 78( 15) 64( 13) E4( 13) E5( 13) 1D( 12) 54( 12) 5E( 9) 21( 6) 0E( 5) 12( 5)
2 1/ 1 01( 0) 02( 0) 03( 0) 04( 0) 05( 0) 06( 0) 07( 0) 08( 0) 09( 0) 0A( 0) 0B( 0)

KEY FOUND! [ E54:C36:4D ]
Decrypted correctly: 0%

E5( 38) A7( 8) CE( 5) 0A( 3) 13( 3) 2A( 3) 8C( 3) C5( 3) D2( 3) 01( 0) 06( 0)
1 1/ 9 5C( 32) 78( 15) 64( 13) E4( 13) E5( 13) 1D( 12) 54( 12) 5E( 9) 21( 6) 0E( 5) 12( 5)
2 1/ 1 01( 0) 02( 0) 03( 0) 04( 0) 05( 0) 06( 0) 07( 0) 08( 0) 09( 0) 0A( 0) 0B( 0)

KEY FOUND! [ E54:C3:B2:A1 ]
Decrypted correctly: 0%


I only collected IV's, no beacons this time. A previous file containing some 260,000 IVs with beacons was 44M, this time using --ivs the file was only 1.2M.

The last decrypt is correct but why do i get a different key each time I run aircrack? Also the number of keys tested varies. I am guessing that the algorithm starts off at a different each time in the file.
Thanks in advance.