Article

Article title IMPLEMENTATION OF THE ATTACK ON THE PROTOCOL WPA2
Authors K.I. Emelianov
Section SECTION II. SECURITY OF INFORMATION SYSTEMS AND NETWORKS
Month, Year 11, 2009 @en
Index UDC 681.324
DOI
Abstract The article describes the practical realization of the attack on the subsystem wireless security protocols, TKIP (Temporal Key Integrity Protocol), used in WPA/WPA2.

Download PDF

Keywords Wireless security protocols; WPA; WPA2; TKIP; attack; access point.
References 1. Erik Tews, Ralf-Philipp Weinmann, and Andrei Pyshkin. Breaking 104 bit WEP in less than 60 seconds [Электронный ресурс] / Режим доступа: http://eprint.iacr.org/2007/120.pdf, свободный. – Загл. с экрана.
2. Aircrack manual [Электронный ресурс] / Режим доступа: http://www.aircrack-
ng.org/doku.php, свободный. – Загл. с экрана.
3. Adam Stubble_eld, John Ioannidis, and Aviel D. Rubin. A key recovery attack on the
802.11b wired equivalent privacy protocol (WEP). ACM Transactions on Information and System Security, 7(2):319{332, May 2004.
4. Erik Tews. Attacks on the wep protocol. Cryptology ePrint Archive, Report 2007/471,
2007. [Электронный ресурс] / Режим доступа: http://eprint.iacr.org/. - свободный. – Загл. с экрана.

Comments are closed.