Strengthening the Encryption Mechanism in WEP Protocol

نویسندگان

  • Jaspreet Singh
  • Sandeep Singh Kang
چکیده

Wi-Fi is serving as a standard for broadband connectivity in homes, offices, and at many public locations. WEP is a security protocol for WLANs designed to give security equivalent to that provided on Wired Networks. It is a framework that uses RC4 encryption algorithm. Many flaws had been discovered in the RC4 algorithm by the experts. In the RC4 the encryption is performed by a ‘bit-by-bit’ ‘exclusive or’ operation with the secret key and if the key becomes known by unauthorized individuals, the key is compromised and data of the sender in the network can be interpreted by the hackers. In this paper we analyze some weaknesses on the RC4 stream cipher which is used by WEP Protocol and we proposes an public key encryption scheme Elliptic Curve Cryptography (ECC) in WEP which will overcomes the drawbacks of RC4 encryption Protocol and further we analyze the NAF and Block Method of Point Multiplication in ECC. The proposed ECC encryption will provide the secure encryption mechanism in the WEP Protocol.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices

The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse of the same key stream by different frames is a weakness in the WEP. One enhancement to WEP is the Temporal Key Integrity Protocol (TKIP), which acts as a wrapper to the WEP protocol and uses a 128 bit RC4 encryption ...

متن کامل

Enhancing Message Privacy in WEP

The Wired Equivalent Privacy (WEP) protocol for networks based on 802.11 standards has been shown to have several security flaws. In this paper we have proposed a modification to the existing WEP protocol to make it more secure. We also develop an IV avoidance algorithm that eliminates Initialization Vector (IV) collision problem by assigning unique pattern of IV bits to each node. We achieve M...

متن کامل

Wireless Networking: Compromising Security for Convenience?

The Wired Equivalent Privacy (WEP) option to the 802.11 standard is the first step in addressing security concerns; it is an encryption provision. WEP is a security protocol designed to provide a wireless local area network with a level of security and privacy comparable to what is usually expected of a wired network. However since physical security mechanisms no longer apply, the goal of the a...

متن کامل

Burglarproof WEP Protocol on Wireless Infrastructure

With the popularization of wireless network, security issue is more and more important. When IEEE 802.11i draft proposed TKIP, it is expected to improve WEP (Wired Equivalent Privacy) on both active and passive attack methods. Especially in generating and management of secret keys, TKIP uses more deliberative attitude to distribute keys. Besides, it just upgrades software to accomplish these fu...

متن کامل

Wireless Security: WPA Vs WAPI, should we be worried?

The IEEE 802.11 standard includes an optional encryption capability, the Wired Equivalent Privacy (WEP) however, WEP is vulnerable to attack and can easily be broken, therefore WEP was recently temporarily supplemented with Wi-Fi Protected Access (WPA) which offers improvements over WEP while a newer, more secure protocol 802.11i is developed. However, China has now introduced a new security pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012