期刊文献+

WEP2中IV用小端法计数器产生时的攻击方法

A Method of Attacking WEP2 When IVs Are Generated from a Little-Endian Counter
在线阅读 下载PDF
导出
摘要 在WEP2密码协议中未规定IV的具体产生方法 ,而计数器方式是实践中常用的IV产生方式之一 .当IV用小端法计数器方式产生时 ,本文提出了一种通过观察网络中传输的特殊形式的密文帧 ,第一步恢复WEP2中秘密密钥的第二、第三个字节的值 ,第二步恢复秘密密钥第一个字节的值 ,两步共计 2 4比特秘密密钥值的攻击方法 .在此基础上再使用IVWeakness攻击 ,可恢复WEP2的全部 12 8比特秘密密钥 .文中给出了此时这种攻击方法的具体步骤、原理及仿真结果 . WEP2 protocol does not specify how the IVs are generated.However,in practice,the method of generating IVs from a counter is commonly used.When the IVs are generated from a little-endian counter,we present a cracking method which can recover the first 24 bits of WEP2's secret key in two steps,by observing the ciphered frames with special form transferred in the network.At the first step,we can recover the second and third bytes of the secret key,and at the second step we can get the first key byte.Then on this basis,by using the IV Weakness cracking method,the total 128 bits of WEP2's secret key can be recovered.The method and principle of this attack are represented in detail,and the simulation results are also given.
出处 《电子学报》 EI CAS CSCD 北大核心 2004年第10期1698-1701,共4页 Acta Electronica Sinica
基金 国家自然科学基金 (No .60 2 72 0 4 7) 国家"863"项目 (No.2 0 0 1AA1 4 30 4 0 )
关键词 信息处理技术 密码分析 第二个输出字节 有线同等私密协议2 小端法计数器 information processing cryptanalysis the second output byte WEP2 little-endian counter
  • 相关文献

参考文献4

  • 1IEEE Standards Board.802 part 11:Wireless LAN medium access control(MAC)and physical layer( PHY) specifications[S].IEEE Standard 802.11,1999 Edition.
  • 2Jesse Walker.TGe security baseline draft text[DB/OL].http://grouper.ieee.org/groups/802/11/March 2001.
  • 3S Fluhrer,I Mantin,A Shamir.Weaknesses in the key scheduling algorithm of RC4[A].Eighth annual workshop on selected areas in Cryptography[C].August 2001.
  • 4Tim Moore.Suggested changes to robust security network (RSN) for IEEE 802.11[DB/OL].http://grouper.ieee.org/groups/802/11/Sep 2,2002.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部