Abstract:
This paper introduces Wired Equivalent Privacy(WEP) protocol and RC4 used in WEP. Crrent researches in the method of attacking WEP protocol including chopchop, fragmentation attack, FMS attack and PTW attack are described. The attack principles are discussed respectively, and the root cause of attacking WEP successful and the necessity of switching to WPA/WPA2 are illustrated. These researches are analyzed and concluded.
Key words:
Wireless Local Area Network(WLAN),
Wired Equivalent Privacy(WEP) protocol,
Wi-Fi Protected Access(WPA)
摘要: 介绍有线等效保密(WEP)协议及用到的RC4算法,论述针对WEP协议的chopchop攻击、分段攻击、FMS攻击和PTW攻击等。阐述各种攻击的攻击原理,指出攻击成功的根本原因和切换到WPA/WPA2安全体系的必要性。
关键词:
无线局域网,
有线等效保密协议,
Wi-Fi联盟受限接入
CLC Number:
LIU Yong-Lei, JIN Zhi-Gang. Research on Attack to WEP Protocol[J]. Computer Engineering, 2010, 36(22): 153-154.
刘永磊, 金志刚. WEP协议攻击方法研究[J]. 计算机工程, 2010, 36(22): 153-154.