透過您的圖書館登入
IP:3.147.54.242
  • 學位論文

無線安全網路協定

Secure Wireless Transfer Protocol

指導教授 : 林金城
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


TKIP協定為802.11i [1] 草案提出之改進802.11 [2] WEP (Wired Equivalent Privacy) 加密方式,用以決解目前WEP上的漏洞包括主動攻擊及被動攻擊方式, 特別在金鑰的產生及金鑰的管理方面以更嚴謹的方式處理,並在不變更目前硬體 設備情況下,只需軟體作升級即可使用。 但TKIP協定對於目前市面流通之硬體設備顯然造成傳輸性能大幅下降。本論文將針對在不變更不新增硬體狀況下,更改其加密方法使得改善TKIP傳輸資料流量減少的現象,又能達到TKIP預期的傳輸安全性,以此提出新的協定方式,此新協定將比TKIP更適合目前市場流通產品,此外並可與現行延伸或加強的加密方式802.1x [3] 及VPN [8] 搭配使用。論文也將比較此新協定與TKIP之差異性及優異點。

關鍵字

TKIP WEP IEEE 802.11 family WLAN SWTP

並列摘要


TKIP Protocol is a method which 802.11i [1] Draft proposed the improvement of 802.11[2] WEP (Wired Equivalent Privacy) encryption method. This protocol can solve current WEP’s loopholes which including actively attack and passively attack methods, especially in secret key’s generation and management which use more conscientious and careful way to dispose. Also, it can be use in only upgrading software, without change hardware equipments. But TKIP Protocol is obviously causing transmission function decrease greatly for current market’s hardware equipments. This dissertation is aimed at without changing and increasing hardware equipments, and changes its encryption method for improving the circumstance of TKIP transmission data flow rate’s decrease. Also, it reaches the transmission security as TKIP Protocol’s anticipation. For these reasons, bring up new protocol method which more suitable for current market products. Besides, it can be used and collocated with current extended or reinforced encryption methods, 802.0x[3] and VPN[8]. This dissertation will compare this new Protocol with TKIP Protocol’s differences and advantages.

並列關鍵字

IEEE 802.11 family SWTP TKIP WEP WLAN

參考文獻


[1]IEEE Std 802.11i/D3.0, November 2002
[10]SAFE: “Wireless LAN Security in Depth” by Cisco Systems, Inc.
[12]Nikita Borisov, Ian Goldberg, David Wagner, “Intercepting Mobile Communications: The Insecurity of 802.11” http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html
[20]Arbaugh, W.A. May 2001. An inductive chosen plaintext attack against WEP/WEP2. www.cs.umd.edu/waa/wepwep2-attack.html.
[21]Adam Stubblefield, John Ioannidis, and Aviel Rubin, “Using the Fluhrer, Mantin, and Shamir Attack to Break WEP”, http://www.cs.rice.edu/~astubble/wep_attack.pdf

延伸閱讀


國際替代計量