摘要
给出了一种利用PRGA第二个输出字节,攻击基于RC4的WEP之类密码协议的具体可行方法。此种方法与基本的IV Weakness相结合,且采用优化的密文捕获帧数确定机制之后所得到的新方法,能较为显著的提高攻击的性能,实用性更强。文中阐述了这种攻击的原理,并给出了仿真结果。
A practical method of cracking RC4-based protocol just like WEP with the PRGAs second output byte is given in detail. When this method is used together with the basic IV Weakness, and optimized by the decision method of how many ciphertext frames are need to be captured, the performance of this new attack can be improved evidently, and the attack becomes more practical. The principle of this attack is explained, and the simulation results are given.
出处
《通信学报》
EI
CSCD
北大核心
2004年第1期11-21,共11页
Journal on Communications
基金
国家"863"高技术研究发展计划基金资助项目(2001AA140328)
国家自然科学基金资助项目(60272047)