Visual Cryptography Based on Key Exchange and Authentication in Wireless Data Transmission Encryption

碩士 === 國立臺北科技大學 === 電資碩士班 === 99 === With the popularity of the Internet, especially for the widespread application of wireless networks, the security of information itself has been drawn more attention. The Wired Equivalent Privacy (WEP) is the first version of wireless security privacy established...

Full description

Bibliographic Details
Main Authors: Yi-Ling Lee, 李宜玲
Other Authors: 駱榮欽
Format: Others
Language:en_US
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/5rep98
Description
Summary:碩士 === 國立臺北科技大學 === 電資碩士班 === 99 === With the popularity of the Internet, especially for the widespread application of wireless networks, the security of information itself has been drawn more attention. The Wired Equivalent Privacy (WEP) is the first version of wireless security privacy established by IEEE 802.11 standard for network protection and is one of the most common method used in wireless networks encryption. The key stream of RC4 is able to find circumstances under which one or more generated bytes are correlated with a small subset of the key bytes. However, because of the lack of its own key management in the RC4 algorithm, it has been proven that whose key will be cracked under violent attacks. A new method to strengthen the capability of WEP encryption was proposed in this paper. We use the Visual Cryptography Scheme (VCS) and Toral Automorphisms which is called Authentication WEP for hiding and encrypting the key and data parts. It provides high security and personal authentication in the wireless data transmission. Moreover, it only requires the update of software instead of modifying any hardware equipments. According to the simulation results, the proposed method could enhance the network security and key exchange, and personal confidentiality under authentication WEP.