WLAN 802.11/11b数据加密机制的安全分析
东南大学信息安全研究中心,南京 210096
下一篇 上一篇
摘要
在802.11标准中的加密采用WEP协议,用于提供链路层数据传输的安全保护。目前,在原有EP的基础上提出了一些改进方案,能提高WEP的安全性能,但理论上缺少严密的安全分析。笔者通过数学模型对这些解决方案以及原有WEP协议进行量化分析,推导出机制内各模块与整个安全机制间安全性能的对应函数关系,并比较了这些方案间安全性能的差异,证明这些安全机制可以提高原有WEP的安全性能,在理论上为用户提供如何构造满足所需安全性能的WLAN数据加密增强机制。
参考文献
[ 1 ] LMSCoftheIEEEComputerSociety.WirelessLANMediumAccessControl (MAC ) andPhysicalLayer (PHY) Specifications[S].IEEEStandard802.11, 1999
[ 2 ] RivestRL .TheRC4EncryptionAlgorithm[P].USA :RSADataSecurity, Inc, Mar12, 1992
[ 3 ] WalkerJR .UnsafeatAnyKeySize;anAnalysisoftheWEPEncapsulation[S].IEEEDocument802.11-00/362, Oct2000
[ 4 ] SimonD , AbobaB , MooreT .IEEE 80211Securityand8021X [S].IEEEDocument80211-00/034r1, Mar2000
[ 5 ] DawsonE , NielsenL .AutomatedcryptanalysisofXORplaintextstrings[J].Cryptologia, Apr, 1996, (2) :165~181
[ 6 ] FluhrerS , MantinI, ShamirA .WeaknessesinthekeyschedulingalgorithmofRC4[R ].EighthAnnualWorkshoponSelectedAreasinCryptography, August2001
[ 7 ] StubblefieldA , IoannidisJ, RubinA .Usingthefluhrer, nantin, andshamirattacktobreakWEP [R].AT&TLabsTechnicalReportTD -4ZCPZZ, 2001
[ 8 ] 耿 嘉, 曹秀英.无线局域网中基于RC4的加密算法的分析与改进[J].通信技术, 2002, (09) :95~97 链接1
[ 9 ] LMSCoftheIEEEComputerSociety.WirelessMediumAccessControl (MAC) andPhysicalLayer (PHY ) Specifications:SpecificationforEnhancedSecurity[S].IEEESTD 802.11i/D3.0, November2002
[10] YingWenping, KeyHoppingTM -ASecurityEnhancementSchemeforIEEE 80211WEPStandards[S].February2002
[11] GrimmCB .WiFiProtectedAccess (WPA) Version1.2[S].WiFiAlliance, December16, 2002
[12] MooreT .SuggestedChangestoRobustSecurityNetwork (RSN ) forIEEE 802.11[S].IEEETGidoc.IEEE 802.1102/298r4, May2002
[13] Di eW , OorschotPvan, WienerM .Authenticationandauthenticatedkeyexchanges[J].Designs, CodesandCryptography, 1992, 2 (2) :107~125 链接1
[14] BihamM , MicallS .Howtogeneratecryptographicallystrongsequencesofpseudo randombits[J].SLAMJournalonComputing, 1984, 13 (4) :850~864
[15] BellareM , DesaiA , JokipiiE , etal.Aconretesecuritytreatmentofsymmetricencryption:AnalysisoftheDESmodesofoperation[A].Procofthe38thIEEEFOCS [C].IEEE , 1997
[16] AbdallaM , BellareM .Increasingthelifetimeofakey:acomparativeanalysisofthesecurityofre keyingtechniques[A ].OkamotoT , editor.AdvancesinCryptologyASIACRYPT 2000, Volume1976ofLectureNotesinComputerScience[C].SpringerVerlag, 2000
[17] KrawczykH , BellareM , CanettiR .HMAC :KeyedHashingforMessageAuthentication[S].RFC2401, February1997
[18] RogawayP , BellareM , BlackJ, etal.OCB :ABlockCipherModeofOperationforEfficientAuthenticatedEncryption[S].ACMConferenceonComputerandCommunicationsSecurity, August3, 2001
[19] BellareM , CanettiR , KrawczykH .KeyingHashFuntionsforMessageAuthentication[A].KoblitzN , edited.AdvancesinCryptologyCrypto’96, LectureNotesinComputerScienceVolume1109[C ].SpringerVerlag, 1996.1~15