期刊文献+

有线等价私密算法的安全性能分析与改进 被引量:2

Security Analysis and Improvement of Wired Equivalent Privacy
在线阅读 下载PDF
导出
摘要 在深入分析IEEE802.11标准有线等价私密(WEP)算法安全漏洞的基础上,提出了在原有WEP算法中引入逐帧更新的加密密钥和Michael密钥的有效改进方法.分析和仿真结果表明,该方法能够排除WEP算法的安全隐患,提高无线局域网的数据安全性能. The essential causes of wired equivalent privacy (WEP) vulnerability in standard 802.11 for wireless LAN were analyzed. Based on it, an efficient improvement was proposed, which introduces synchronized per-packet encryption keys and Michael keys into the original WEP algorithm. The analysis and simulation show that this improvement can correct the design flaws of WEP stated in some previous papers and promote significantly the security performance of wireless LAN.
作者 严宏 何晨
出处 《上海交通大学学报》 EI CAS CSCD 北大核心 2004年第5期693-696,700,共5页 Journal of Shanghai Jiaotong University
基金 国家自然科学基金资助项目(60372076) 国家高技术研究发展计划(863)项目(2002AA144110)
关键词 无线局域网 有线等价私密算法 RC4流加密算法 密钥更新 Cryptography Data privacy Security of data Wireless telecommunication systems
  • 相关文献

参考文献6

  • 1ISDN0-7381-1812-5.Wireless LAN medium access conrol (MAC) and physical layer (PHY) specifications ANSI,IEEE Std 802.11[S].
  • 2Borisov N,Goldberg L,Wagner D.Intercepting mobile communications:the insecurity of 802.11 [A].Proc of 7th Annual Int Conf Mobile Computing and Networking 2001 Papers[C].Rome,Italy:ACMCN,2001.180-189.
  • 3Wash R.Lecture notes on stream ciphers and RC4[DB/OL].http://www,crimelabs,net/docs/stream.html,2001-09-26.
  • 4Fluhrer S,Mantin I,Shamir A.Weaknesses in the key scheduling algorithm of RC4 [A].Preliminary Draft[C].Canada:CPYPTO,2001.1-24.
  • 5Ferugson N.Michael:an improved MIC for 802.11WEP [EB/OL].http ://grouper.ieee.org/groups/802/11,2002-01-17.
  • 6ISDN0-7381-2927-5.IEEE standard for local and metropolitan area networks-port based network access control,IEEE Std 802.1x-2001 [S].

同被引文献11

  • 1杨磊,高海锋,张根度.应用于IEEE802.1x的可扩展认证协议的安全分析[J].计算机工程,2004,30(10):127-128. 被引量:8
  • 2Kent, Atkinson. Request for Comments 2401 [EB/OL]. http://www. ietf. org/rfc/rfc2401.txt,2005-02-02.
  • 3John Gilmore, Hugh Daniel. Linux- IPSEC Mailing List [EB/OL]. http://www. freeswan. org/mail. html, 2005-02-02.
  • 4John Gilmore, Hugh Daniel. FreeS/Wan Documentation[EB/OL]. http://www. freeswan. org/freeswarttrees/freeswan-1.99/doc/index. html, 2005-02-02.
  • 5IEEE 802.11 Working Group. Status of Project IEEE 802.11i[EB/OL]. http://grouper. ieee. org/groups/802/11/Reports/tgi-update. htm,2005-01-30.
  • 6IETF Working Groups. IP Security Protocol(ipsee) [EB/OL]. http://www. ietf. org /html. charters/ipsec-charter. html,2005-02-02.
  • 7GB15629.11—2003.无线局域网媒体访问控制和物理层规范[S].[S].,..
  • 8ISDNO-7381-1812-5. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications ANSI,IEEE Std. 802. 11[A].
  • 9WiFi Alliance. WPA (WiFi Protected Access) white paper [DB/OL]. http//www. weca. net/OpenSection/pdf/Whitepaper_Wi-Fi_Security4-29-03. pdf.2003-04-28.
  • 10Shamir A. Identity-based cryptosystems and signature schemes [A]. Proceedings of CRYPTO'84 [C].Springer: CRYPTO,1984. 47-53.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部