A hybrid cryptosystem based on WEP for 802.11 networks
Wireless is the next generation networking technology. The security of such technology is very critical because its physical layer is the electro-magnetic waves that can be easily intercepted by anyone. The original security protocol for 802.11 wireless networks is called WEP (Wired Equivalent Priva...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | |
| التنسيق: | article |
| منشور في: |
2006
|
| الوصول للمادة أونلاين: | http://hdl.handle.net/10725/5116 http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://content.iospress.com/articles/journal-of-computational-methods-in-sciences-and-engineering/jcm00145 |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
| _version_ | 1864513465260965888 |
|---|---|
| author | Haraty, Ramzi A. |
| author2 | El Horr, Walid |
| author2_role | author |
| author_facet | Haraty, Ramzi A. El Horr, Walid |
| author_role | author |
| dc.creator.none.fl_str_mv | Haraty, Ramzi A. El Horr, Walid |
| dc.date.none.fl_str_mv | 2006 2017-01-31T09:58:51Z 2017-01-31T09:58:51Z 2017-01-31 |
| dc.identifier.none.fl_str_mv | 1472-7978 http://hdl.handle.net/10725/5116 Haraty, R. A., & El Horr, W. (2006). A hybrid cryptosystem based on WEP for 802.11 networks. Journal of Computational Methods in Sciences and Engineering, 6(5, 6 Supplement 2), 359-377. http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://content.iospress.com/articles/journal-of-computational-methods-in-sciences-and-engineering/jcm00145 |
| dc.language.none.fl_str_mv | en |
| dc.relation.none.fl_str_mv | Journal of Computational Methods in Sciences and Engineering |
| dc.rights.*.fl_str_mv | info:eu-repo/semantics/openAccess |
| dc.title.none.fl_str_mv | A hybrid cryptosystem based on WEP for 802.11 networks |
| dc.type.none.fl_str_mv | Article info:eu-repo/semantics/publishedVersion info:eu-repo/semantics/article |
| description | Wireless is the next generation networking technology. The security of such technology is very critical because its physical layer is the electro-magnetic waves that can be easily intercepted by anyone. The original security protocol for 802.11 wireless networks is called WEP (Wired Equivalent Privacy). It is a protocol that is based on symmetric-key encryption algorithm RC4 (Rivest Cipher 4). Unfortunately, this protocol had many flaws that made it exposed to many attacks. This paper presents a set of improvements for WEP, which include key management and distribution, and authentication. These improvements convert WEP to a hybrid cryptosystem, a system that is based on both a symmetric-key algorithm and an asymmetric-key algorithm. |
| eu_rights_str_mv | openAccess |
| format | article |
| id | LAURepo_fa1be22ff72c65ca8fa3c1eccc8c9579 |
| identifier_str_mv | 1472-7978 Haraty, R. A., & El Horr, W. (2006). A hybrid cryptosystem based on WEP for 802.11 networks. Journal of Computational Methods in Sciences and Engineering, 6(5, 6 Supplement 2), 359-377. |
| language_invalid_str_mv | en |
| network_acronym_str | LAURepo |
| network_name_str | Lebanese American University repository |
| oai_identifier_str | oai:laur.lau.edu.lb:10725/5116 |
| publishDate | 2006 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| spelling | A hybrid cryptosystem based on WEP for 802.11 networksHaraty, Ramzi A.El Horr, WalidWireless is the next generation networking technology. The security of such technology is very critical because its physical layer is the electro-magnetic waves that can be easily intercepted by anyone. The original security protocol for 802.11 wireless networks is called WEP (Wired Equivalent Privacy). It is a protocol that is based on symmetric-key encryption algorithm RC4 (Rivest Cipher 4). Unfortunately, this protocol had many flaws that made it exposed to many attacks. This paper presents a set of improvements for WEP, which include key management and distribution, and authentication. These improvements convert WEP to a hybrid cryptosystem, a system that is based on both a symmetric-key algorithm and an asymmetric-key algorithm.PublishedN/A2017-01-31T09:58:51Z2017-01-31T09:58:51Z20062017-01-31Articleinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/article1472-7978http://hdl.handle.net/10725/5116Haraty, R. A., & El Horr, W. (2006). A hybrid cryptosystem based on WEP for 802.11 networks. Journal of Computational Methods in Sciences and Engineering, 6(5, 6 Supplement 2), 359-377.http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.phphttp://content.iospress.com/articles/journal-of-computational-methods-in-sciences-and-engineering/jcm00145enJournal of Computational Methods in Sciences and Engineeringinfo:eu-repo/semantics/openAccessoai:laur.lau.edu.lb:10725/51162021-03-19T10:00:53Z |
| spellingShingle | A hybrid cryptosystem based on WEP for 802.11 networks Haraty, Ramzi A. |
| status_str | publishedVersion |
| title | A hybrid cryptosystem based on WEP for 802.11 networks |
| title_full | A hybrid cryptosystem based on WEP for 802.11 networks |
| title_fullStr | A hybrid cryptosystem based on WEP for 802.11 networks |
| title_full_unstemmed | A hybrid cryptosystem based on WEP for 802.11 networks |
| title_short | A hybrid cryptosystem based on WEP for 802.11 networks |
| title_sort | A hybrid cryptosystem based on WEP for 802.11 networks |
| url | http://hdl.handle.net/10725/5116 http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://content.iospress.com/articles/journal-of-computational-methods-in-sciences-and-engineering/jcm00145 |