首页 | 本学科首页   官方微博 | 高级检索  
     

基于身份签名的认证方案在WEP协议中的应用
引用本文:莫天庆,张龙军,赵李懿. 基于身份签名的认证方案在WEP协议中的应用[J]. 计算机工程与应用, 2012, 48(9): 83-85
作者姓名:莫天庆  张龙军  赵李懿
作者单位:1.武警工程学院 通信工程系,西安 710086 2.武警工程学院 电子技术系 网络与信息安全武警部队重点实验室,西安 710086
基金项目:国家自然科学基金(No.60842006);陕西省自然科学基金(No.2007F50).
摘    要:分析了WEP协议,指出了WLAN安全机制的最终隐患是初始向量IV未经认证。针对初始向量IV提出一种基于身份签名的认证方案。该方案使用NAI(Network Access Identifier)作为用户公钥,简化了无线环境中的密钥管理问题,有效地解决了对初始向量IV的认证问题。安全性分析表明,该方案能在不改变对现有设施要求的前提下保证初始向量的机密性和不可否认性,能抗FMS分析方法、抗密钥流重复使用和已知明文攻击。

关 键 词:有线等效保密(WEP)  RC4  初始向量  身份签名  

Authentication mechanism using identity based signature in WEP protocol
MO Tianqing , ZHANG Longjun , ZHAO Liyi. Authentication mechanism using identity based signature in WEP protocol[J]. Computer Engineering and Applications, 2012, 48(9): 83-85
Authors:MO Tianqing    ZHANG Longjun    ZHAO Liyi
Affiliation:1.Department of Communication Engineering, Engineering College of Armed Police Force, Xi’an 710086, China 2.Key Lab of Network & Information Security of APF, Engineering College of Armed Police Force, Xi’an 710086, China
Abstract:Based on the analysis on the security mechanism of Wireless Local Area Network (WLAN), it is found that due to the Initial- ization Vector(IV) which is published by Wired Equivalent Privacy(WEP) protocol without encrypting, there are many serious secure leaks in its application. This paper proposes an efficient authentication mechanism using identity based signature to solve these prob- lems. This scheme uses NAI (Network Access Identifier) as public key and simplifies the key management in wireless environment, and it can resolve the deficiency in the authentication of the IV. The analysis demonstrates that the scheme not only guarantees the confi- dentiality and non-repudiation of the IV but also is developed with consideration for taking advantages of the existing hardware facili- ties. It can also protect the IV from the attacks focusing on invariance weakness and IV weakness.
Keywords:Wired Equivalent Privacy (WEP)  RC4  initialization vector  identity based signature
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号