首页 | 本学科首页   官方微博 | 高级检索  
     

WEP协议攻击方法研究
引用本文:刘永磊,金志刚. WEP协议攻击方法研究[J]. 计算机工程, 2010, 36(22): 153-154
作者姓名:刘永磊  金志刚
作者单位:(1. 天津大学 a. 计算机科学与技术学院;b. 电子信息工程学院,天津 300072; 2. 天津城市建设学院电子与信息工程系,天津 300384)
基金项目:天津大学自主创新基金资助项目,天津市高等学校科技发展计划基金资助项目,青海省科技支持计划基金资助项目
摘    要:介绍有线等效保密(WEP)协议及用到的RC4算法,论述针对WEP协议的chopchop攻击、分段攻击、FMS攻击和PTW攻击等。阐述各种攻击的攻击原理,指出攻击成功的根本原因和切换到WPA/WPA2安全体系的必要性。

关 键 词:无线局域网  有线等效保密协议  Wi-Fi联盟受限接入

Research on Attack to WEP Protocol
LIU Yong-lei,JIN Zhi-gang. Research on Attack to WEP Protocol[J]. Computer Engineering, 2010, 36(22): 153-154
Authors:LIU Yong-lei  JIN Zhi-gang
Affiliation:(1a. School of Computer Science and Technology; 1b. School of Electronic and Information Engineering, Tianjin University, Tianjin 300072, China; 2. Department of Electronic and Information Engineering, Tianjin Institute of Urban Construction, Tianjin 300384, China)
Abstract:This paper introduces Wired Equivalent Privacy(WEP) protocol and RC4 used in WEP. Crrent researches in the method of attacking WEP protocol including chopchop, fragmentation attack, FMS attack and PTW attack are described. The attack principles are discussed respectively, and the root cause of attacking WEP successful and the necessity of switching to WPA/WPA2 are illustrated. These researches are analyzed and concluded.
Keywords:Wireless Local Area Network(WLAN)  Wired Equivalent Privacy(WEP) protocol  Wi-Fi Protected Access(WPA)
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号