期刊文献+

一种攻击RC4-WEP类密码的改进方法 被引量:7

An improved method of cracking RC4-WEP-like protocol
下载PDF
导出
摘要 给出了一种利用PRGA第二个输出字节,攻击基于RC4的WEP之类密码协议的具体可行方法。此种方法与基本的IV Weakness相结合,且采用优化的密文捕获帧数确定机制之后所得到的新方法,能较为显著的提高攻击的性能,实用性更强。文中阐述了这种攻击的原理,并给出了仿真结果。 A practical method of cracking RC4-based protocol just like WEP with the PRGAs second output byte is given in detail. When this method is used together with the basic IV Weakness, and optimized by the decision method of how many ciphertext frames are need to be captured, the performance of this new attack can be improved evidently, and the attack becomes more practical. The principle of this attack is explained, and the simulation results are given.
出处 《通信学报》 EI CSCD 北大核心 2004年第1期11-21,共11页 Journal on Communications
基金 国家"863"高技术研究发展计划基金资助项目(2001AA140328) 国家自然科学基金资助项目(60272047)
关键词 信息处理技术 密码分析 第二个输出字节 RC4 有线同等私密 WEP information processing cryptanalysis the second output byte RC4 WEP
  • 相关文献

参考文献4

  • 1[1]FLUHRER S, MANTIN I, SHAMIR A. Weaknesses in the key scheduling algorithm of RC4[EB/OL]. http://www. drizzle.com/aboba/IEEE/rc4_ksaproc.pdf.
  • 2[2]IEEE Standards Board, 802 part 11:Wireless LAN Medium Access Control(MAC)and Physical Layer (PHY) Specifications[S]. IEEE Standard 802.11, 1999.
  • 3[3]HULTON D. Practical exploitation of RC4 weakness in WEP environents[EB/OL]. http://www.dachb0den.com/projects/bsd airtools Feb 22,2002.
  • 4[4]STUBBLEFIELD A, IOANNIDIS J, RUBIN A D. Using the fiuhrer, mantin, and shamir attack to break WEP, revision 2[EB/OL].http://www.cs.rice.edu/astubble/wep/.

同被引文献19

  • 1罗智勇,乔佩利.WEP协议分析及其改进[J].通信管理与技术,2004(6):28-31. 被引量:2
  • 2王小军,陆建德.基于802.11i的四次握手协议的攻击[J].计算机与现代化,2006(5):72-75. 被引量:3
  • 3傅静,鹿凯宁.WLAN中WEP协议RC4算法研究[J].电子测量技术,2006,29(6):141-143. 被引量:2
  • 4Mantin I, Shamir A. A Practical Attack on Broadcast RC4[C]//Proc. of the 8th International Workshop on Fast Software Encryption. [S. l.]: Springer-Verlag, 2002.
  • 5Mantin I. Analysis of the Stream Cipher RC4[D]. Israel: Weizmann Institute of Science, 2001-11-27.
  • 6Mousa A, Hamad A. Evaluation of the RC4 Algorithm for Data Encryption[J]. International Journal of Computer Science & Applications, 2006, 3(2): 44-56.
  • 7Andrew Roos.A class of weak ys in the RC4 stream cipher[OL].http://marcel. Wanda.ch/Archive/WeakKeys, Post in sci.encrypt, September 2004.
  • 8Grosul and D.Wallach.A related key cryptanalysis of RC4,TechReport[R].TR- 00-358, Department of Computer Science, Rice University, June 2000.
  • 9Ginting,R.U,Dillak,R.Y.Digital color image encryption using RCd stream cipher and chaotic logistic map [C]//.International Conference Information Technology and Electrical Engineering (ICITEE).2013 : 101-5.
  • 10刘辛酉.WiFi通信的安全分析[J].信息通信技术,2009,3(4):50-56. 被引量:19

引证文献7

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部