首页> 外文会议>International Conference on Computational Intelligence and Security(CIS 2005) pt.2; 20051215-19; Xi'an(CN) >FMS Attack-Resistant WEP Implementation Is Still Broken: Most IVs Leak a Part of Key Information
【24h】

FMS Attack-Resistant WEP Implementation Is Still Broken: Most IVs Leak a Part of Key Information

机译:FMS抗攻击的WEP实施仍然失败:大多数IV泄漏了一部分关键信息

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we present an attack to break WEP that avoids weak IVs used in the FMS attack. Our attack is a known IV attack that doesn't need the specific pattern of the IVs. This attack transforms most IVs of WEP into weak IVs. If we attempt to avoid all weak IVs used in our attack, the rate at which IVs are avoided is too large to use practical. When using a 128-bit session key, the efficiency of our attack is 2~(72.1) in the most effective case. This implies that our attack can recover a 128-bit session key within realistically possible computational times.
机译:在本文中,我们提出了一种破坏WEP的攻击,可以避免在FMS攻击中使用弱IV。我们的攻击是已知的IV攻击,不需要特定的IV模式。这种攻击将WEP的大多数IV转换为弱IV。如果我们尝试避免在攻击中使用所有弱IV,则避免IV的比率太大,无法使用。使用128位会话密钥时,在最有效的情况下,我们的攻击效率为2〜(72.1)。这意味着我们的攻击可以在实际可能的计算时间内恢复128位会话密钥。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号