I am trying to understand the KRACK on WPA2. But in their paper (PDF) it just simply states that
By forcing nonce reuse in this manner, the encryption protocol can be attacked.
But I cannot find an explanation WHY this is possible. I.e. what exactly happens, that when a nonce is reused, the encryption protocol can be attacked?