A hybrid cryptosystem based on WEP for 802.11 networks

Wireless is the next generation networking technology. The security of such technology is very critical because its physical layer is the electro-magnetic waves that can be easily intercepted by anyone. The original security protocol for 802.11 wireless networks is called WEP (Wired Equivalent Priva...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Haraty, Ramzi A. (author)
مؤلفون آخرون: El Horr, Walid (author)
التنسيق: article
منشور في: 2006
الوصول للمادة أونلاين:http://hdl.handle.net/10725/5116
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
http://content.iospress.com/articles/journal-of-computational-methods-in-sciences-and-engineering/jcm00145
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513465260965888
author Haraty, Ramzi A.
author2 El Horr, Walid
author2_role author
author_facet Haraty, Ramzi A.
El Horr, Walid
author_role author
dc.creator.none.fl_str_mv Haraty, Ramzi A.
El Horr, Walid
dc.date.none.fl_str_mv 2006
2017-01-31T09:58:51Z
2017-01-31T09:58:51Z
2017-01-31
dc.identifier.none.fl_str_mv 1472-7978
http://hdl.handle.net/10725/5116
Haraty, R. A., & El Horr, W. (2006). A hybrid cryptosystem based on WEP for 802.11 networks. Journal of Computational Methods in Sciences and Engineering, 6(5, 6 Supplement 2), 359-377.
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
http://content.iospress.com/articles/journal-of-computational-methods-in-sciences-and-engineering/jcm00145
dc.language.none.fl_str_mv en
dc.relation.none.fl_str_mv Journal of Computational Methods in Sciences and Engineering
dc.rights.*.fl_str_mv info:eu-repo/semantics/openAccess
dc.title.none.fl_str_mv A hybrid cryptosystem based on WEP for 802.11 networks
dc.type.none.fl_str_mv Article
info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/article
description Wireless is the next generation networking technology. The security of such technology is very critical because its physical layer is the electro-magnetic waves that can be easily intercepted by anyone. The original security protocol for 802.11 wireless networks is called WEP (Wired Equivalent Privacy). It is a protocol that is based on symmetric-key encryption algorithm RC4 (Rivest Cipher 4). Unfortunately, this protocol had many flaws that made it exposed to many attacks. This paper presents a set of improvements for WEP, which include key management and distribution, and authentication. These improvements convert WEP to a hybrid cryptosystem, a system that is based on both a symmetric-key algorithm and an asymmetric-key algorithm.
eu_rights_str_mv openAccess
format article
id LAURepo_fa1be22ff72c65ca8fa3c1eccc8c9579
identifier_str_mv 1472-7978
Haraty, R. A., & El Horr, W. (2006). A hybrid cryptosystem based on WEP for 802.11 networks. Journal of Computational Methods in Sciences and Engineering, 6(5, 6 Supplement 2), 359-377.
language_invalid_str_mv en
network_acronym_str LAURepo
network_name_str Lebanese American University repository
oai_identifier_str oai:laur.lau.edu.lb:10725/5116
publishDate 2006
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
spelling A hybrid cryptosystem based on WEP for 802.11 networksHaraty, Ramzi A.El Horr, WalidWireless is the next generation networking technology. The security of such technology is very critical because its physical layer is the electro-magnetic waves that can be easily intercepted by anyone. The original security protocol for 802.11 wireless networks is called WEP (Wired Equivalent Privacy). It is a protocol that is based on symmetric-key encryption algorithm RC4 (Rivest Cipher 4). Unfortunately, this protocol had many flaws that made it exposed to many attacks. This paper presents a set of improvements for WEP, which include key management and distribution, and authentication. These improvements convert WEP to a hybrid cryptosystem, a system that is based on both a symmetric-key algorithm and an asymmetric-key algorithm.PublishedN/A2017-01-31T09:58:51Z2017-01-31T09:58:51Z20062017-01-31Articleinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/article1472-7978http://hdl.handle.net/10725/5116Haraty, R. A., & El Horr, W. (2006). A hybrid cryptosystem based on WEP for 802.11 networks. Journal of Computational Methods in Sciences and Engineering, 6(5, 6 Supplement 2), 359-377.http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.phphttp://content.iospress.com/articles/journal-of-computational-methods-in-sciences-and-engineering/jcm00145enJournal of Computational Methods in Sciences and Engineeringinfo:eu-repo/semantics/openAccessoai:laur.lau.edu.lb:10725/51162021-03-19T10:00:53Z
spellingShingle A hybrid cryptosystem based on WEP for 802.11 networks
Haraty, Ramzi A.
status_str publishedVersion
title A hybrid cryptosystem based on WEP for 802.11 networks
title_full A hybrid cryptosystem based on WEP for 802.11 networks
title_fullStr A hybrid cryptosystem based on WEP for 802.11 networks
title_full_unstemmed A hybrid cryptosystem based on WEP for 802.11 networks
title_short A hybrid cryptosystem based on WEP for 802.11 networks
title_sort A hybrid cryptosystem based on WEP for 802.11 networks
url http://hdl.handle.net/10725/5116
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
http://content.iospress.com/articles/journal-of-computational-methods-in-sciences-and-engineering/jcm00145