Implementation of Wlan Wep Protocol by Rc4 Algorithm in Vhdl

نویسندگان

  • B. Subhakara Rao
  • M. Prashanthi
  • Phani Kumar
چکیده

The WLAN is a network that utilizes radio frequency technology. The security of wireless data stream becomes particularly prominent. The WLAN uses RC4 stream encryption algorithm of the WEP protocol to enhance its Security.WEP itself also has fatal Security flaws, tampering with the data for a variety of active attacks. In essence, the problem is not in RC4 itself but in the way to generate the key and how to use the key for RC4 encryption. Many hacker and computer security experts have discovered the WEP design flaws, which indicate that IEEE 802.11 standard can only provide limited support to confidentiality, WEP provides a 40-bit key which may be sufficient to keep away a common hacker but in capable to ward of professional hacker. WLAN has become a hot spot of application in the field of telecommunication. To secure WLAN for data transmission, RC4 algorithm is able to provide the advantages of fast performance resource constrained environment. This paper analyzes the security of RC4 algorithm, presents a way to enhance the security of RC4 algorithm and analysis the affection of the enhanced algorithm. RC4 is probably the most widely used stream cipher now a day due to its simplicity and high efficiency. This paper also focuses on the research to enhance RC4 algorithm that includes analyzes the security of RC4 algorithm, presents a way to enhance the security of RC4 algorithm. The data is encrypted by XOR ing data with the key stream which is generated by RC4 algorithm.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Research on WEP of WLAN

Wires Equivalent Privacy (WEP) is used to improve the security of wireless LAN (WLAN). By analyzing the weaknesses of WEP and RC4, we design a simulative platform including software and hardware to crack WEP keys. The results show that the WLAN based on WEP is insecure. At last we give some improvements to enhance the WLAN security.

متن کامل

IVs to Skip for Immunizing WEP against FMS Attack

The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over-the-air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The FMS attack can basically be prevented by skipping IVs (Initial Values) used in the attack, but naive ...

متن کامل

Strengthening the Encryption Mechanism in WEP Protocol

Wi-Fi is serving as a standard for broadband connectivity in homes, offices, and at many public locations. WEP is a security protocol for WLANs designed to give security equivalent to that provided on Wired Networks. It is a framework that uses RC4 encryption algorithm. Many flaws had been discovered in the RC4 algorithm by the experts. In the RC4 the encryption is performed by a ‘bit-by-bit’ ‘...

متن کامل

Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns -

The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over the air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The attack was then extended and implemented as WEP cracking tools. The key recovery attacks can basicall...

متن کامل

RC4 stream cipher and possible attacks on WEP

In this paper we analyze and present some weaknesses and possible attacks on the RC4 stream cipher which were published in many journals. We review some advantages and disadvantages which come from several authors, as well as similarities and differences which can be observed in the published results. Also, we analyze the Key Scheduling Algorithm (KSA) which derives the initial state from a var...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012