The study of the defects in WEP protocol
碩士 === 國立臺北科技大學 === 電機工程系所 === 94 === Concerning the installation convenience and the mobility of hosts, the adoption of wireless local area network, which mainly chooses IEEE 802.11 for communication protocol and usually uses WEP for packet encryption, is getting more and more popular. But caused b...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2006
|
Online Access: | http://ndltd.ncl.edu.tw/handle/z9bh8e |
id |
ndltd-TW-094TIT05442034 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-094TIT054420342019-06-27T05:09:07Z http://ndltd.ncl.edu.tw/handle/z9bh8e The study of the defects in WEP protocol WEP通訊協定缺陷之研究 Chen-Chung Lu 盧承忠 碩士 國立臺北科技大學 電機工程系所 94 Concerning the installation convenience and the mobility of hosts, the adoption of wireless local area network, which mainly chooses IEEE 802.11 for communication protocol and usually uses WEP for packet encryption, is getting more and more popular. But caused by the inherent WEP flaw, the generated secret key lost its effectiveness, i.e. the attacker can easily retrieve the plaintext without knowing the secret key. In this paper, we proposed a method to crack WEP aimed at this flaw. First, we could imagine the first 40 bytes of the key sequence according to the characteristic of WEP. Then we extended this key sequence to the length of maximum transmission unit. Finally, the dictionary for all key sequences had been built up corresponding to every Initialization Vector. After implementation, we proved the effectiveness of this method. Jenn-Shing Wang Yung-Chung Wang 王振興 王永鐘 2006 學位論文 ; thesis 49 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺北科技大學 === 電機工程系所 === 94 === Concerning the installation convenience and the mobility of hosts, the adoption of wireless local area network, which mainly chooses IEEE 802.11 for communication protocol and usually uses WEP for packet encryption, is getting more and more popular. But caused by the inherent WEP flaw, the generated secret key lost its effectiveness, i.e. the attacker can easily retrieve the plaintext without knowing the secret key.
In this paper, we proposed a method to crack WEP aimed at this flaw. First, we could imagine the first 40 bytes of the key sequence according to the characteristic of WEP. Then we extended this key sequence to the length of maximum transmission unit. Finally, the dictionary for all key sequences had been built up corresponding to every Initialization Vector. After implementation, we proved the effectiveness of this method.
|
author2 |
Jenn-Shing Wang |
author_facet |
Jenn-Shing Wang Chen-Chung Lu 盧承忠 |
author |
Chen-Chung Lu 盧承忠 |
spellingShingle |
Chen-Chung Lu 盧承忠 The study of the defects in WEP protocol |
author_sort |
Chen-Chung Lu |
title |
The study of the defects in WEP protocol |
title_short |
The study of the defects in WEP protocol |
title_full |
The study of the defects in WEP protocol |
title_fullStr |
The study of the defects in WEP protocol |
title_full_unstemmed |
The study of the defects in WEP protocol |
title_sort |
study of the defects in wep protocol |
publishDate |
2006 |
url |
http://ndltd.ncl.edu.tw/handle/z9bh8e |
work_keys_str_mv |
AT chenchunglu thestudyofthedefectsinwepprotocol AT lúchéngzhōng thestudyofthedefectsinwepprotocol AT chenchunglu weptōngxùnxiédìngquēxiànzhīyánjiū AT lúchéngzhōng weptōngxùnxiédìngquēxiànzhīyánjiū AT chenchunglu studyofthedefectsinwepprotocol AT lúchéngzhōng studyofthedefectsinwepprotocol |
_version_ |
1719209841116839936 |