期刊文献+

WEP数据加密协议的两种改进攻击 被引量:4

Two improved attacks on the WEP data encryption protocol
下载PDF
导出
摘要 对于IEEE 802.11无线局域网标准中的WEP协议,利用发送数据帧探测明文数据的chop-chop攻击和利用已知明密文对恢复密钥的FMS攻击是2种重要的攻击方法。改进了chop-chop攻击,改进后的chop-chop攻击的速度和所需发送WEP数据帧的数量分别提高16倍和减少到1/16。给出了一个改进的FMS攻击——FMS+攻击,在攻击者只具备被动监听网络的能力和各种典型的已知明密文对数量的假设下,FMS+攻击将FMS攻击可以利用的WEP数据帧数量提高2倍以上,且一般情况下,FMS+将FMS攻击恢复密钥的成功率提高至少20%以上。 For the WEP protocol in the IEEE 802.11 wireless LAN standard,the chop-chop attack which sends data frames to probe plaintext information and the FMS attack which uses known plain/cipher-text pairs to recover the WEP key are two important attacks.The original chop-chop attack was improved,with both a speedup of the attack by a factor of 16 and a decrease of the amount of data frames needed to 1/16.An improved attack of FMS—FMS+ was also pro-posed.Assuming that an attacker is only capable of passively eavesdropping the network communication and under vari-ous typical assumptions on the amount of known plain/cipher-text pairs,the number of WEP data frames that can be used by FMS+ is more than twice of that by FMS,and in general cases,FMS+ achieves an improvement of successful key re-covery probability of at least 20%,compared with FMS.
作者 孙思维 胡磊
出处 《通信学报》 EI CSCD 北大核心 2010年第9期102-108,共7页 Journal on Communications
基金 国家自然科学基金资助项目(60773134 10990011) 国家高技术研究发展计划("863"计划)基金资助项目(2006AA01Z416) 国家重点基础研究发展计划("973"计划)基金资助项目(2007CB311201)~~
关键词 WEP协议 chop-chop攻击 FMS攻击 RC4流密码 WEP protocol chop-chop attack FMS attack RC4 stream cipher
  • 相关文献

参考文献9

  • 1IEEE,ANSI/IEEE Standard 802.11b:Wireless LAN Medium Access Control (MAC) and Physical Layer (Phy) Specifications[S].1999.
  • 2BORISOV N,GOLDBERG I,WAGNER D.Intercepting mobile communications:the insecurity of 802.11[A].Proceedings of ACM MobiCom 2001[C].Italy,2001.180-189.
  • 3FLUHRER S,MANTIN I,SHAMIR A.Weaknesses in the key sched-uling algorithm of RC4[J].Selected Areas in Cryptography,2001,2559(10):101-117.
  • 4KOREK.Chop-chop experimental WEP attacks[EB/OL].http://www.netstumbler.org/showthread.php?t=12489,2004.
  • 5KOREK.Next generation of WEP attacks?[EB/OL].http://www.netstumbler.org/showthread.php?p=93942&postcount=35,2004.
  • 6KLEIN A.Attacks on the RC4 stream cipher[J].Designs,Codes,and Cryptography,2008,48(3):269-286.
  • 7TEWS E,BECK M.Practical attacks against WEP and WPA[A].Proceedings of the Second ACM Conference on Wireless Network Security[C].Zurich,2009.79-86.
  • 8BITTAU A,HANDLEY M,LACKEY J.The final nail in WEP's coffin[A].IEEE Symposium on Security and Privacy[C].USA,2006.386-400.
  • 9BARON A.Hi-tech heist,how hi-tech thieves stole millions of cus-tomer financial records[EB/OL].http://www.cbsnews.com/,2007.

同被引文献16

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部