机构地区: 东南大学信息科学与工程学院移动通信国家重点实验室
出 处: 《通信学报》 2004年第1期11-21,共11页
摘 要: 给出了一种利用PRGA第二个输出字节,攻击基于RC4的WEP之类密码协议的具体可行方法。此种方法与基本的IV Weakness相结合,且采用优化的密文捕获帧数确定机制之后所得到的新方法,能较为显著的提高攻击的性能,实用性更强。文中阐述了这种攻击的原理,并给出了仿真结果。 A practical method of cracking RC4-based protocol just like WEP with the PRGAs second output byte is given in detail. When this method is used together with the basic IV Weakness, and optimized by the decision method of how many ciphertext frames are need to be captured, the performance of this new attack can be improved evidently, and the attack becomes more practical. The principle of this attack is explained, and the simulation results are given.