期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
基于集中式WLAN分离MAC架构的TKIP协议 被引量:4
1
作者 刘立群 火久元 +1 位作者 唐鼎 武文忠 《计算机工程》 CAS CSCD 北大核心 2008年第1期181-183,共3页
实现强健安全网络(RSN)是大规模部署安全无线网络的最佳选择。该文分析了集中式WLAN结构的特点,比较了分离MAC方式与其他方式的不同之处,研究了TKIP协议封装原理。给出一种新的分离MAC功能的方法,在集中式WLAN分离MAC架构下设计实现了... 实现强健安全网络(RSN)是大规模部署安全无线网络的最佳选择。该文分析了集中式WLAN结构的特点,比较了分离MAC方式与其他方式的不同之处,研究了TKIP协议封装原理。给出一种新的分离MAC功能的方法,在集中式WLAN分离MAC架构下设计实现了暂时密钥完整性协议(TKIP),描述了软件在嵌入式系统中的实现。对有待进一步解决的问题进行了讨论。 展开更多
关键词 集中式WLAN 分离MAC 强健安全网络 暂时密钥完整性协议 CBC—MAC计数模式协议
在线阅读 下载PDF
802.11无线局域网安全技术研究 被引量:11
2
作者 孙树峰 贺樑 +1 位作者 石兴方 顾君忠 《计算机工程与应用》 CSCD 北大核心 2003年第7期40-42,59,共4页
文章首先分析了静态WEP加密的原理和它的缺陷,然后分别从认证和加密的角度讨论了802.11无线局域网改进的安全措施和方案。
关键词 无线局域网 网络安全 RC4算法 加密 用户身份 临时密钥完整性协议
在线阅读 下载PDF
Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i
3
作者 韩玮 郑东 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期81-85,共5页
Temporal key integrity protocol (TKIP) is a sub-protocol of IEEE 802.11i. TKIP remedies some security flaws in wired equivalent privacy (WEP) protocol. TKIP adds four new algorithms to WEP: a message integrity co... Temporal key integrity protocol (TKIP) is a sub-protocol of IEEE 802.11i. TKIP remedies some security flaws in wired equivalent privacy (WEP) protocol. TKIP adds four new algorithms to WEP: a message integrity code (MIC) called Michael, an initialization vector (IV) sequencing discipline, a key mixing function and a reeying mechanism. The key mixing function, also called temporal key hash, de-correlates the IVs from weak keys. Some cryptographic properties of the substitution box (S-box) used in the key mixing function are investigated in this paper, such as regularity, avalanche effect, differ uniform and linear structure. Moen et al pointed out that there existed a temporal key recovery attack in TKIP key mixing function. In this paper a method is proposed to defend against the attack, and the resulting effect on performance is discussed. 展开更多
关键词 wireless local area network (WLAN) temporal key integrity protocol (tkip substitution box (S- box)
原文传递
Security Mechanisms of Wired Equivalent Privacy and Wi-Fi Protected Access in WLAN:Review and Analysis
4
作者 张显石 康戈文 王新珩 《Journal of Southwest Jiaotong University(English Edition)》 2009年第1期16-21,共6页
An analysis of WLAN security mechanisms of wired equivalent privacy (WEP) and Wi-Fi protected access (WPA) discovers that the current literature is not totally creditable in its judgment on the security value of W... An analysis of WLAN security mechanisms of wired equivalent privacy (WEP) and Wi-Fi protected access (WPA) discovers that the current literature is not totally creditable in its judgment on the security value of WEP and WPA. Based on the respective performances of WEP and WPA under certain typical attacks, this paper substantiates the judgment that WEP has quite a few vulnerabilities concerning confidentiality and integrity, but at the same time challenges the judgment on WPA with that WPA is robust enough to confront potential typical attacks and is not so unreliable as the current literature believes, although it has some vulnerabilities in its message integrity code (MIC). 展开更多
关键词 WLAN security WEP WPA temporal key integrity protocol (tkip
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部