期刊文献+

针对RC4算法的无线局域网攻击 被引量:3

Attack on WLAN Based on RC4Encryption Algorithm
下载PDF
导出
摘要 无线局域网的802.11标准采用WEP(有线等价保密协议),用来保护链路层的通信不被窃听和其他攻击。该文首先分析了WEP协议中使用的RC4加密算法,然后给出该算法里在密钥时序安排里的两种安全漏洞,这些安全漏洞导致了针对无线局域网的可行的攻击手段存在。最后根据RC4加密算法存在的相关密钥漏洞对无线局域网进行攻击并成功获取密钥,并给出一些改进攻击手段的设想。 The802.11standard for wireless networks includes a Wired Equivalent Privacy(WEP)protocol,used to protect link-layer communications from eavesdropping and other attacks.In this paper,we present analysis of the RC4encryption algorithm which is used in widely deployed WEP.And give two weaknesses in the key scheduling algorithm of RC4.The flaws lead to a number of practical attacks.Finally we make a practical related-key attack experiment based on known IV weakness and crack the key successfully.Some improvements for our WLAN attack are also available.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第29期191-194,共4页 Computer Engineering and Applications
基金 安徽省教育厅自然科学重点研究项目(编号:2002kj331ZD)资助
关键词 无线局域网 信息安全 攻击 Wireless LAN,information security,attack
  • 相关文献

参考文献20

  • 1A Biryukov,A Shamir,D Wagner. Real time cryptanalysis of a5/1 on a pc[C].In :FSE:Fast software Encryption ,2000 被引量:1
  • 2Fluhrer, McGrew. Statistic analysis of the alleged RC4 keystream generator[C].In: FSE: Fast Software Encryption, 2000 被引量:1
  • 3A L Grosul ,D S Wallach. A related-key cryptanalysis of RC4.2000-06 被引量:1
  • 4Knudsen,Meier,Preneel et al.Analysis methods for RC4[C].In:ASIACRYPT:Advances in Cryptology-ASIACRYPT[C].In:International conference on the Theory and Application of Cryptology. LNCS,SpringerVerlag, 1998 被引量:1
  • 5Scott Fluhrer,Itsik Mantin,Adi Shamir. Weakness in the Key Scheduling Algorithm of RC4[C].In:the Eighth Annual Workshop on Selected Areas in Cryptography,2001-08 被引量:1
  • 6Adam Stubblefield,John Ioannidis,Aviel D Rubin. Using The Fluhrer,Mantin,and Shamir Attack to Break Wep,2001-08 被引量:1
  • 7KENT S,ATINSON R.Security architecture for the Internet protocol[S].Request for Conments 2401,Internet Engineering Task Force,1998-11 被引量:1
  • 8POSTEL J,REYNOLDS J K.Standard for the transmission of IP datagrams over IEEE 802 networks[S].Request for Comments 1042,Internet Engineering Task Force, 1998-02 被引量:1
  • 9Zyren,A1 Petrick.IEEE 802.11 Tutorial 被引量:1
  • 10Sultan Weatherspoon. Overview of IEEE 802.11 b Security[J].Intel Technology Journal Q2,2000 被引量:1

同被引文献11

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部