Using Time Variant Key Scheme To Against WEP Attack

碩士 === 長庚大學 === 電機工程學研究所 === 96 === The IEEE 802.11 standard defines WEP (wired equivalent privacy). WEP is designed to provide data privacy to the level of wired network. WEP protocol is the security mechanism of IEEE802.11 wireless local area network standard. In WEP, the key scheduling algorithm...

Full description

Bibliographic Details
Main Authors: Szu Hsien Lin, 林思賢
Other Authors: 邱榮輝
Format: Others
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/56184055681807975221
Description
Summary:碩士 === 長庚大學 === 電機工程學研究所 === 96 === The IEEE 802.11 standard defines WEP (wired equivalent privacy). WEP is designed to provide data privacy to the level of wired network. WEP protocol is the security mechanism of IEEE802.11 wireless local area network standard. In WEP, the key scheduling algorithm uses either a 64-bit packet key (40-bit secret key plus 24-bit IV) or a 128-bit key (104-bit secret key plus 24-bit IV) to set up the RC4.WEP uses the combination of the initialization vector (IV) and the secret key as the input of RC4 to produce a pseudo random keystream. Then produce the ciphertext by exclusive-or the plaintext and keystream. WEP is vulnerable to several effective attacks. The most effective attack is the known IV attack. This paper describes the secret key is fixed , changes Time Variant Key Scheme, attack is not easier. the increase system security, only complex also increases, This research in view of safely strengthens, proposed enhanced of improvement the WEP safety scheme against existing WEP key attack.