The study of the defects in WEP protocol

碩士 === 國立臺北科技大學 === 電機工程系所 === 94 === Concerning the installation convenience and the mobility of hosts, the adoption of wireless local area network, which mainly chooses IEEE 802.11 for communication protocol and usually uses WEP for packet encryption, is getting more and more popular. But caused b...

Full description

Bibliographic Details
Main Authors: Chen-Chung Lu, 盧承忠
Other Authors: Jenn-Shing Wang
Format: Others
Language:zh-TW
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/z9bh8e
id ndltd-TW-094TIT05442034
record_format oai_dc
spelling ndltd-TW-094TIT054420342019-06-27T05:09:07Z http://ndltd.ncl.edu.tw/handle/z9bh8e The study of the defects in WEP protocol WEP通訊協定缺陷之研究 Chen-Chung Lu 盧承忠 碩士 國立臺北科技大學 電機工程系所 94 Concerning the installation convenience and the mobility of hosts, the adoption of wireless local area network, which mainly chooses IEEE 802.11 for communication protocol and usually uses WEP for packet encryption, is getting more and more popular. But caused by the inherent WEP flaw, the generated secret key lost its effectiveness, i.e. the attacker can easily retrieve the plaintext without knowing the secret key. In this paper, we proposed a method to crack WEP aimed at this flaw. First, we could imagine the first 40 bytes of the key sequence according to the characteristic of WEP. Then we extended this key sequence to the length of maximum transmission unit. Finally, the dictionary for all key sequences had been built up corresponding to every Initialization Vector. After implementation, we proved the effectiveness of this method. Jenn-Shing Wang Yung-Chung Wang 王振興 王永鐘 2006 學位論文 ; thesis 49 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺北科技大學 === 電機工程系所 === 94 === Concerning the installation convenience and the mobility of hosts, the adoption of wireless local area network, which mainly chooses IEEE 802.11 for communication protocol and usually uses WEP for packet encryption, is getting more and more popular. But caused by the inherent WEP flaw, the generated secret key lost its effectiveness, i.e. the attacker can easily retrieve the plaintext without knowing the secret key. In this paper, we proposed a method to crack WEP aimed at this flaw. First, we could imagine the first 40 bytes of the key sequence according to the characteristic of WEP. Then we extended this key sequence to the length of maximum transmission unit. Finally, the dictionary for all key sequences had been built up corresponding to every Initialization Vector. After implementation, we proved the effectiveness of this method.
author2 Jenn-Shing Wang
author_facet Jenn-Shing Wang
Chen-Chung Lu
盧承忠
author Chen-Chung Lu
盧承忠
spellingShingle Chen-Chung Lu
盧承忠
The study of the defects in WEP protocol
author_sort Chen-Chung Lu
title The study of the defects in WEP protocol
title_short The study of the defects in WEP protocol
title_full The study of the defects in WEP protocol
title_fullStr The study of the defects in WEP protocol
title_full_unstemmed The study of the defects in WEP protocol
title_sort study of the defects in wep protocol
publishDate 2006
url http://ndltd.ncl.edu.tw/handle/z9bh8e
work_keys_str_mv AT chenchunglu thestudyofthedefectsinwepprotocol
AT lúchéngzhōng thestudyofthedefectsinwepprotocol
AT chenchunglu weptōngxùnxiédìngquēxiànzhīyánjiū
AT lúchéngzhōng weptōngxùnxiédìngquēxiànzhīyánjiū
AT chenchunglu studyofthedefectsinwepprotocol
AT lúchéngzhōng studyofthedefectsinwepprotocol
_version_ 1719209841116839936