期刊文献+

WLAN802.11/11b数据加密机制的安全分析 被引量:1

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
下载PDF
导出
摘要 在 8 0 2 1 1标准中的加密采用WEP协议 ,用于提供链路层数据传输的安全保护。目前 ,在原有WEP的基础上提出了一些改进方案 ,能提高WEP的安全性能 ,但理论上缺少严密的安全分析。笔者通过数学模型对这些解决方案以及原有WEP协议进行量化分析 ,推导出机制内各模块与整个安全机制间安全性能的对应函数关系 ,并比较了这些方案间安全性能的差异 ,证明这些安全机制可以提高原有WEP的安全性能 。 As an expansion of LAN, the WLAN reduce the cost of building a network infrastructure, to enjoy the mobile, high quality, multimedia services. The 802 11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is used to protect link layer communications from eavesdropping and other attacks. Several serious security flaws in this protocol have been discovered and some solutions have been proposed to enhance WEP security. However, it is doubtful whether they can provide enough security as these solutions lack precisely security analysis. In this paper,concrete security analyses of various enhancing mechanisms are given. Results show that these mechanisms indeed increase security and bring significant, provable security gains in WLAN environment. The authors quantify the security as a function of the security of the primitives used, thereby enabling a user to decide how to construct an enhanced mechanism for desired demands.
出处 《中国工程科学》 2004年第10期32-38,共7页 Strategic Study of CAE
基金 "八六三"高技术计划资助项目 ( 2 0 0 2AA14 3 0 10 )
关键词 WLAN 安全分析 WEP 密钥更新 WLAN encryption WEP rekey
  • 相关文献

参考文献19

  • 1LMSC of the IEEE Computer Society. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications [S]. IEEE Standard 802.11, 1999
  • 2Rivest R L. The RC4 Encryption Algorithm [P].USA: RSA Data Security, Inc, Mar 12, 1992
  • 3Walker J R. Unsafe at Any Key Size; an Analysis of the WEP Encapsulation [ S]. IEEE Document 802.11-00/362, Oct 2000
  • 4Simon D, Aboba B, Moore T. IEEE 802. 11 Security and 802.1X [S]. IEEE Document 802.11 -00/034rl, Mar 2000
  • 5Dawson E, Nielsen L. Automated cryptanalysis of XOR plaintext strings [J]. Cryptologia, Apr, 1996,(2): 165~181
  • 6Fluhrer S, Mantin I, Shamir A. Weaknesses in the key scheduling algorithm of RC4 [ R ]. Eighth Annual Workshop on Selected Areas in Cryptography, August 2001
  • 7Stubblefield A, Ioannidis J, Rubin A. Using the fluhrer,nantin, and shamir attack to break WEP [R]. AT&T Labs Technical Report TD-4ZCPZZ, 2001
  • 8耿嘉,曹秀英.无线局域网中基于RC4的加密算法的分析与改进[J].通信技术,2002,35(9X):95-97. 被引量:5
  • 9LMSC of the IEEE Computer Society. Wireless Medium Access Control ( MAC ) and Physical Layer (PHY)Specifications: Specification for Enhanced Security [S].IEEE STD 802. 11i/D3.0, November 2002
  • 10Ying Wenping, Key HoppingTM - A Security Enhancement Scheme for IEEE 802.11 WEP Standards [S]. February 2002

共引文献4

同被引文献11

  • 1宋宇波,胡爱群,蔡天佑.无线局域网TKIP协议的安全分析[J].应用科学学报,2005,23(1):67-70. 被引量:5
  • 2吴文玲,冯登国.分组密码工作模式的研究现状[J].计算机学报,2006,29(1):21-36. 被引量:40
  • 3IEEE Standard 802. 11i. IEEE standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements part 11 : wireless LAN medium access control (MAC) and physical layer (PHY) specifications : medium access control (MAC) security enhancements[ S ]. New York: Institute of Electrical and Electronics Engineers, 2004.
  • 4IEEE Standard 802:11. Wireless LAN medium access control ( MAC ) and physical layer ( PHY ) specifications[ S ]. New York: Institute of Electrical and Electronics Engineers, 1999.
  • 5Lipmaa H, Rogaway P, Wagner D. CTR : counter mode encryption [EB/OL ]. ( 2003-06-09 ) [ 2007-04- 09 ]. http://csrc. nist. gov/CryptoToolkit/modes/prop- osedmodes/ctr/.
  • 6ISO. IS08372-87 Information processing. Modes of operation for a 642bit block cipher algorithm [ EB/ OL]. [2007-04-06 ]. http://www. eos. org. eg/web- en/cat/items/d15530. html.
  • 7Bellare M, Namprempre C. Authenticated encryption: relations among notions and analysis of the generic composition paradigm [ C ]//Advances in Cryptology-Asiacrypt 2000. Berlin, Springer Verlag, 2000 : 531 - 545.
  • 8Bellare M, Desai A, J0kipii E, et al. A concrete security treatment of symmetric encryption: analysis of the DES modes of operation [ C ]//Proceedings of 38th Annual Symposium on Foundations of Computer Science. Miami Beach, Florida, 1997 : 394 - 403.
  • 9Bellare M, Kilian J, Rogaway P. The security of the cipher block chaining message authentication code[J].Journal of Computer and System Sciences, 2000, 61 (3) : 362 - 399.
  • 10Krawczyk H. The order of encryption and authentication for protecting communications [ C ]//Advances in Cryptology--CRYPTO. Santa Barbara, California, USA: Springer Verlag, 2001:310-331.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部