期刊文献+

基于对称密钥加密的RSN密钥协商改进方法 被引量:1

An Improved Method of RSN Key Negotiation Based on Pairwise Key Encryption Technology
下载PDF
导出
摘要 通过对IEEE802.11i无线局域网安全标准中动态密钥协商机制的详细分析,发现四次握手过程存在缺陷并且有可能遭受伪造消息的拒绝服务(DoS)攻击。针对这一安全漏洞,提出一种基于对称密钥加密技术的四次握手过程改进方法。这一改进方法改变了IEEE802.11i四次握手过程中明文传送密钥材料的策略,使用AES加密算法对密钥材料进行加密,从而避免了攻击者通过伪造消息进行DoS攻击。为了验证这一改进方法的有效性,利用Python和pyCrypto组件对其进行了模拟与分析,从模拟结果可以看出,这一改进方法能够很好地避免DoS攻击,同时不会引起申请者的内存耗尽和CPU性能下降,进一步增强了WLAN的安全性。 Through the analysis of IEEE802.11 i key negotiation mechanisms,it is found that there exists security vulnerability in 4-way handshake, which will lead to a DoS attack. Aiming at this security flaw, an improved method based on pair,vise key encryption technology is developed. This improved method encrypts keying material using AES encryption algorithm, which changes the transfer key material strategy in 4-way handshake process, so as to avoid DoS attack. This improved method is simulated by using Python and the pyCrypto module. From the simulation results it can be seen that the improved method can well avoid DoS attack, at the same time will not cause the applicant' s run out of memory and CPU performance decline,further enhance the security of WLAN.
出处 《计算机技术与发展》 2013年第6期132-135,共4页 Computer Technology and Development
基金 国家"863"高技术发展计划项目(2012AA021105)
关键词 无线局域网 IEEE802 11i 密钥协商 四次握手 拒绝服务 对称密钥 WLAN IEEES02.11 i key negotiation 4-way handshake DoS pairwise key
  • 相关文献

参考文献12

二级参考文献55

  • 1朱恺,曹秀英.无线局域网中RADIUS协议原理与实现[J].微计算机信息,2004,20(9):118-120. 被引量:13
  • 2陆波波,黄鸿,任雪梅,张燕.802.11无线局域网安全与应用研究[J].微计算机信息,2005,21(5):226-227. 被引量:16
  • 3M Matsui. Linear cryptanalysis method for DES cipher[ A]. Advances in Cryptology, Proceedings of Eurocrypt ' 93 [ C ].Lofthus, Norway:Spfinger-Verlag. 1994.386 - 397. 被引量:1
  • 4J Daemen,L Knudsen, V Rijnmen. The block cipher Square[ A]. Fast So-ftware Encryption, Fourth International Workshop[ C]. Haifa, Israel:Springer-Verlag. 1997.149 - 165. 被引量:1
  • 5L R Knudsen. Block ciphers: state of the art[ R]. Copies of transparencies for lecture at the International Course on State of the Art and Evolution of Computer Security and Industrial Cryptography. Katholieke Unive-rsiteit Leuven, Belgium, 1997. 被引量:1
  • 6Y Hu, Y Zhang, G Xiao. Integral cryptanalysis of SAFER + [ J]. Electroni-es Letters, 1999,35(17) : 1458 - 1459. 被引量:1
  • 7L R Knudsen, D Wagner. Integral cryptanalysis [ EB ]. Available:https://www. cosic. esat. kuleuven, ac. be/nessie. 被引量:1
  • 8N Ferguson, J Kelsey, et al. Improv-ed cryptanalysis of Rijndael[ A].Fast Software Encryption, 7th lnternat-ional Workshop, FSE 2000[ C ].NewYork, USA: Springer-Verlag, 2001.213 - 230. 被引量:1
  • 9T Jakobsen, L Knudsen. The interpolation attack on block ciphers[ A].Fast software encryption, fouth international workshop[ C ]. Haifa, Israel: Springer-Verlag. 1997.28 - 40. 被引量:1
  • 10Paul Kocher, Joshua Jaffe, Benjamin Jun, Introduction to differential power analysis and related attacks[ EB]. Available: http://www. cryptography. com/dpa./technical. 被引量:1

共引文献77

同被引文献15

引证文献1

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部