DocumentCode :
2512356
Title :
Wireless networks security: Proof of chopchop attack
Author :
Guennoun, Mouhcine ; Lbekkouri, Aboubakr ; Benamrane, Amine ; Ben-Tahir, Mohamed ; El-Khatib, Khalil
Author_Institution :
Fac. des Sci. de Rabat, Dept. Math-Inf., Univ. Mohammed V-Agdal, Rabat
fYear :
2008
fDate :
23-26 June 2008
Firstpage :
1
Lastpage :
4
Abstract :
An encryption protocol is the first line of defense against network attacks. The wired equivalent privacy (WEP), used to secure 802.11 based networks, suffers from many weaknesses that were exploited in order to compromise the security of the network, data confidentiality and integrity. An attack named chopchop can decrypt the content of a frame without knowing the encryption key. There has been no theoretical proof of the functionality of the attack. In this paper, we will give a review of the attack and build a mathematical model to prove theoretically that the attack is capable of decrypting messages in WEP enabled wireless networks without requiring the knowledge of the encryption key.
Keywords :
cryptographic protocols; telecommunication security; 802.11 based networks; chopchop attack; data confidentiality; data integrity; encryption protocol; wired equivalent privacy; wireless networks security; Access protocols; Availability; Communication channels; Cryptographic protocols; Cryptography; Data privacy; Data security; Protection; Wireless application protocol; Wireless networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
World of Wireless, Mobile and Multimedia Networks, 2008. WoWMoM 2008. 2008 International Symposium on a
Conference_Location :
Newport Beach, CA
Print_ISBN :
978-1-4244-2099-5
Electronic_ISBN :
978-1-4244-2100-8
Type :
conf
DOI :
10.1109/WOWMOM.2008.4594924
Filename :
4594924
Link To Document :
بازگشت