期刊文献+

TKIP的MIC-Michael算法和安全性分析 被引量:3

Analyze security of MIC- Michael in TKIP
下载PDF
导出
摘要 目前无线局域网的安全性问题是其目前发展中存在的主要障碍之一,针对IEEE802.11标准采用的WEP(wired equiva-lent privacy)中的不安全因素,TGI提出了WEP的改进方案TKIP(temporal key integrity protocol),主要分析了TKIP中的完整性算法MIC(message integrity code)Michael的结构以及安全性。 Recently, the security of WLAN is one of the main obstacles. Aimed at the insecurity factor of the WEP (wired equivalency protocol) on legacy 802.11 standard, the TKIP is brought forward by TGI, which is a suite of algorithms likely to be put into place to patch WEP. The security of the MIC-Michael in TKIP is analyzed.
作者 陈卓 王瑞民
出处 《计算机工程与设计》 CSCD 北大核心 2006年第7期1149-1150,1163,共3页 Computer Engineering and Design
基金 湖北省教育厅青年基金项目(2004Q002)
关键词 无线局域网 802.11 有线等价保密协议 TKIP MICHAEL wireless local area network 802.11 WEP TKIP Michael
  • 相关文献

参考文献7

  • 1IEEE Std 802.11.Standards for local and metropolitan area networks:Wireless LAN medium access control (MAC) and physical layer (PHY)specifications,1999[S].
  • 2Regan Kevin.Wireless LAN security[J].Network Security 2003,2003(1):7-9.
  • 3Jesse R walker.Unsafe at any key size:An analysis of the WEP encapsulation[S].DOC:IEEE 802.11-00/362,2000.
  • 4Fluhrer S,Mantin I,Shamir A.Weaknesses in the key scheduling algorithm of RC4[R].Toronto,Canada:In Eighth Annual Workshop on Selected Areas in Cryptography,2001-08.3-24.
  • 5朱晓妍,田海博,王育民.TKIP协议简介及其安全分析[J].信息安全与通信保密,2004,26(4):39-41. 被引量:3
  • 6Doug Whiting,Russ Housley,Neils Ferguson.TKIP with 48-bits Ivs IEEE 802.11-02/229r0 January 17,2002[EB/OL].http://grouper.ieee.org/groups/80 2/11.
  • 7Wool Avishai.A note on the fragility of the "Michael" message integrity code[J].IEEE Transactions on Wireless Communications,2004,3(5):1459-1462.

共引文献2

同被引文献18

  • 1王开云,刘渊,范晓岚,姜建国.无线局域网802.11i与IPSec的比较分析[J].计算机工程与设计,2006,27(6):928-930. 被引量:3
  • 2冷月.无线网络保卫战[J].计算机应用文摘,2006(26):79-81. 被引量:7
  • 3王茂才,戴光明,宋军,胡汉平.无线局域网的安全性研究[J].计算机应用研究,2007,24(1):158-160. 被引量:44
  • 4谢俊汉.浅析计算机无线网络技术及其应用[J].中国教育技术装备,2007(1):62-64. 被引量:7
  • 5李宇,缪海燕.改进基于WEP协议的无线局域网的安全[J].计算机应用,2007,27(B06):250-251. 被引量:3
  • 6Sithirasenan E,Muthukkumarasamy V.An early warning system for IEEE 802.11i wireless networks [C]. AusWireless'06: Proceedings the of 1st Australian Conference on Broadband Wireless and Ultra Wideband,2006:25-30.
  • 7Sithirasenan E, Muthukkumarasamy V, Powell D. IEEE 802.11i WLAN security protocol-a software engineer's model[C].Aus- CERT'05:Proceedings of the 4th Asia Pacific Information Technology Security Conference,2005:39-50.
  • 8He C,Mitchell J C. Security analysis and improvements for IEEE 802.11 i[C]. 12th Annual Network and Distributed System Security Symposium(NDSS'05).San Diego:IEEE,2005: 90-110.
  • 9SITHIRASENAN E, MUTHUKKUMARASAMY V D. IEEE 802. 11i WLAN security protocol-a software en_gineerrs model [C]// Proceedings of the 4th Asia Pacific Security Conference on Information Technology. Australia: SCIT, 2005:39-50.
  • 10SITHIRASENAN E, MUTHUKKUMARASAMY V. An early warning system for IEEE 802. lli wireless networks[C]// Proceedings of the 1st Australian Conference on Broadband Wireless and Ultra Wideband. Australian: BWUW, 2006: 25-30.

引证文献3

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部