A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP).
Adam StubblefieldJohn IoannidisAviel D. RubinPublished in: ACM Trans. Inf. Syst. Secur. (2004)
Keyphrases
- secret key
- authentication protocol
- mutual authentication
- private key
- wireless local area network
- security mechanisms
- block cipher
- key distribution
- wireless networks
- smart card
- privacy preserving
- public key
- authentication scheme
- security analysis
- stream cipher
- lightweight
- high security
- homomorphic encryption
- trusted third party
- security protocols
- denial of service attacks
- key exchange protocol
- secure multiparty computation
- rfid systems
- cryptographic protocols
- encryption scheme
- security issues
- private information
- access points
- resource constrained
- privacy protection
- hash functions
- personal information
- anomaly detection