Font Size: a A A

Research Of The Security Technique In Wireless Network

Posted on:2006-04-18Degree:MasterType:Thesis
Country:ChinaCandidate:M L ChengFull Text:PDF
GTID:2178360212482705Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
hnique in wireless network. It particularly analyzes the principle of encryption and decryption, certification of message and identity, management of keys with the basic knowledge of cryptology. Based on them, the following is done:1. It figures out some potential safety hazards in WAN: a series of leaks in WEP by using IV in the process of algorithm; algorithm of message certification is too simple to protect it from malice modification and message incoming; certification of identity has no secrets because of sharing keys; certification in network is based on hardware, it can easily cause hardware threats.2. It provides regular settlement of security.3. It provides safeguard of enhancing security in WAN.4. It improves on algorithm of WAN.5. It puts forward the identity certification and management of keys based on public key.6. It achieves encryption based on RSA and digital signature.This thesis is made of three parts. First part simply introduces safety actuality of wireless network and the basic knowledge of the cryptology. The second part is the emphases of this article, it takes three chapters to introduce WAN, analyze the principle of cryptology and safety hazards. The third part intensifies security performance from different angles based on results of the second part, and achieves encryption based on RSA and digital signature.
Keywords/Search Tags:cryptology, certification of identity, key management, certification of message, visit point, workstation, WEP, public key, sharing key, single key, WAN
PDF Full Text Request
Related items