期刊文献+

无线局域网TKIP协议的安全分析 被引量:5

The Security Analysis for WLAN TKIP Protocol
下载PDF
导出
摘要 通过建立数学模型的方法对TKIP(temporalkeyintegrityprotocol)进行量化的安全分析,推导出TKIP协议内各模块与整个协议安全性能的对应函数关系,特别着重分析了iv空间与安全强度间的关系.根据分析得出TKIP协议虽然提高原有WEP(wiredequivalentprivacy)的安全性能,但其安全强度并没有预想的高. As an expansion of LAN, the WLAN reduces the cost of building a network infrastructure and enables the users to enjoy the mobile services. The 802.11 standard includes a wired equivalent privacy (WEP) protocol, which is used to protect communications from eaves dropping. Several serious security flaws in this protocol have been discovered. To cope with this problem, IEEE802.11i Group proposed adapting TKIP protocol to enhance the WLAN security. In this paper, through analyzing TKIP protocol, concrete security analyses of TKIP protocol are made. It was shown that although TKIP did indeed increase security and result in significant, provable security gains, but it still failed to meet the need of users in a WLAN environment.
出处 《应用科学学报》 CAS CSCD 北大核心 2005年第1期67-70,共4页 Journal of Applied Sciences
基金 863高技术计划资助项目(2002AA143010)
  • 相关文献

参考文献12

  • 1IEEE Standard 802.11. Wireless LAN medium access control ( MAC ) and physical layer (PHY) specifications [ S ].1999 Edition.
  • 2Wi-Fi Alliance. Wi-Fi protected access (WPA) version 1.2[S]. C Brian Grimm , Wi-Fi Alliance, December 16,2002.
  • 3Winget N, Housley R, Wagner D, et al. Security flaws in 802.11 data link protocols [ C ]. Communications of the ACM, May 2003.46(5) :35 - 39.
  • 4Diffie W, Van Oorschot P, Wiener M. Authentication and authenticated key exchanges [ J ]. Designs, Codes and Cryptography, 1992,2(2): 107 - 125.
  • 5Biham M, Micall S. How to generate cryptographically strong sequences of pseudo-random bits [ J]. SLAM Journal on Computing, 1984,13(4): 850 - 864.
  • 6Bellare M, Desai A, Jokipii E, et al. A conrete security treatment of symmetric encryption: Analysis of the DES modes of operation[A]. Proc of the 38th IEEE FOCS[C].1997.
  • 7Abdalla M, Bellare M. Increasing the lifetime of a key: A comparative analysis of the security of re-keying techniques[A]. Advances in Cryptology - Asiacrypt 2000, Tatsuaki Okamoto, editor, volume 1976 of Lecture Notes in Computer Science[ C ] . Springer-Verlag, 2000.
  • 8Walker J R. Unsafe at any key size: An analysis of the WEP encapsulation[ EB/OL]. IEEE Document 802.11-00/362, Oct 2000. http: 11grouper. ieec. org/groups/802/11/Documents/index. html
  • 9Simon D, Aboba B, Moore T. IEEE 802.11 security and 802. 1x[ EB/OL ]. IEEE Document 802.11-00/034r1, Mar 2000. http: 11grouper. ieec. org/groups/802/11/Documents/index. html
  • 10Arbaugh WA, Shankar N, WanYJ. Your802.11 wireless network has no clothes [ J/OL]. http://www. cs. umd. edu/waa/wireless. pdf, Mar 2001.

同被引文献21

  • 1宋宇波,胡爱群,蔡天佑.WLAN802.11/11b数据加密机制的安全分析[J].中国工程科学,2004,6(10):32-38. 被引量:1
  • 2姜浩伟,李永杰,汪厚祥.Wep协议加密算法安全隐患分析[J].舰船电子工程,2005,25(5):60-61. 被引量:5
  • 3吴文玲,冯登国.分组密码工作模式的研究现状[J].计算机学报,2006,29(1):21-36. 被引量:40
  • 4姚志强,蒲江,唐金艺.802.11无线局域网安全性分析[J].计算机安全,2006(4):11-13. 被引量:7
  • 5李宇,缪海燕.改进基于WEP协议的无线局域网的安全[J].计算机应用,2007,27(B06):250-251. 被引量:3
  • 6WINGET N C, HOUSLEY R, WAGNER D, et al. Security flaws in 802.11 data link protocols[J]. Communications of the ACM, 2003,46 (5) : 35 - 39.
  • 7IEEE Standard 802. 11i. IEEE standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements part 11 : wireless LAN medium access control (MAC) and physical layer (PHY) specifications : medium access control (MAC) security enhancements[ S ]. New York: Institute of Electrical and Electronics Engineers, 2004.
  • 8IEEE Standard 802:11. Wireless LAN medium access control ( MAC ) and physical layer ( PHY ) specifications[ S ]. New York: Institute of Electrical and Electronics Engineers, 1999.
  • 9Lipmaa H, Rogaway P, Wagner D. CTR : counter mode encryption [EB/OL ]. ( 2003-06-09 ) [ 2007-04- 09 ]. http://csrc. nist. gov/CryptoToolkit/modes/prop- osedmodes/ctr/.
  • 10ISO. IS08372-87 Information processing. Modes of operation for a 642bit block cipher algorithm [ EB/ OL]. [2007-04-06 ]. http://www. eos. org. eg/web- en/cat/items/d15530. html.

引证文献5

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部