Font Size: a A A

Safety Analysis Of Wireless LAN & WEP Key Improvement

Posted on:2015-01-03Degree:MasterType:Thesis
Country:ChinaCandidate:G J GaoFull Text:PDF
GTID:2348330503494020Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the improvement of human living quality and the faster pace of our daily working, especially the popularity of smart phones, tablet PCs and other mobile devices, the original wired internet access mode can not meet people's demands of learning, living and working. With the convenience of wireless network, also the mobility, flexibility and other advantages, which made wireless network became a popular method of connecting people and information in the world quickly. Wireless LAN as a branch in the wireless family, relative to the wired LAN, became the most related to our working and living. Meanwhile, the security issues also exists in the wireless LAN.In this paper, first based on IEEE802.11 i agreement, elaborated its key management processes, data security transmission, then Wired Equivalent Privacy WEP and WPA/WPA2 wireless application protocol commonly used in both the wireless LAN encryption protocol is elaborated by me with analyzing its encryption and decryption algorithms, integrity mechanisms to identify defects on its agreement and proposed ideas for their safety. In view of this, the parper then focused on WEP protocol simulated security analysis by way of self-built environment, and the current international popular WPA/WPA2 security research, such as a rainbow table attack, GPU brute force, distributed attacks are described. The WEP key vulnerability management, and use of existing environmental analysis, a dynamic key improvement ideas, and by comparing the experiment to verify the improved algorithm has a certain role. Finally, the outcome and the lack of existing research stage are described, analyzed the cause, and then prospected the future of wireless LAN security.
Keywords/Search Tags:Wireless LAN, IEEE802.11i, WEP/WPA, Security Analysis
PDF Full Text Request
Related items