Entry Stubblefield:2004:KRA from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Stubblefield:2004:KRA,
author = "Adam Stubblefield and John Ioannidis and Aviel D.
Rubin",
title = "A key recovery attack on the 802.11b wired equivalent
privacy protocol {(WEP)}",
journal = j-TISSEC,
volume = "7",
number = "2",
pages = "319--332",
month = may,
year = "2004",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/996943.996948",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Nov 4 08:41:51 MST 2004",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "In this paper, we present a practical key recovery
attack on WEP, the link-layer security protocol for
802.11b wireless networks. The attack is based on a
partial key exposure vulnerability in the RC4 stream
cipher discovered by Fluhrer, Mantin, and Shamir. This
paper describes how to apply this flaw to breaking WEP,
our implementation of the attack, and optimizations
that can be used to reduce the number of packets
required for the attack. We conclude that the 802.11b
WEP standard is completely insecure, and we provide
recommendations on how this vulnerability could be
mitigated and repaired.",
acknowledgement = ack-nhfb,
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- apply,
2(2)177,
2(3)269,
10(4)4,
10(4)5,
12(1)1,
13(4)40,
14(1)2,
14(1)6,
17(4)15,
18(1)4
- based,
1(1)3,
2(1)34,
2(2)177,
2(3)230,
2(3)295,
2(3)332,
3(3)161,
9(2)162,
9(2)181,
9(4)421,
10(1)2,
10(1)4,
10(2)6,
11(1)3,
11(2)1,
11(2)4,
11(3)12,
11(3)15,
11(4)17,
11(4)18,
12(1)1,
12(1)4,
12(2)13,
12(3)16,
12(3)17,
12(3)18,
13(3)24,
13(3)27,
13(3)28,
13(4)29,
13(4)30,
13(4)31,
13(4)41,
14(1)3,
14(1)4,
14(1)8,
14(1)9,
14(1)10,
14(4)30,
15(2)6,
15(2)7,
15(3)13,
16(2)8,
16(4)16,
17(1)3,
17(2)7,
17(3)12,
17(4)13,
17(4)14,
17(4)15,
17(4)16,
18(1)1,
18(1)4,
18(3)10,
18(3)11,
18(4)14
- breaking,
7(2)206,
12(2)9,
12(2)13
- cipher,
4(2)134,
13(4)33,
16(1)2,
16(3)10,
18(1)4
- completely,
2(1)105,
2(3)269,
11(3)12,
14(4)28
- conclude,
10(1)2,
16(4)13
- could,
1(1)26,
10(3)11,
12(2)9,
14(1)10,
17(1)1,
17(4)14,
18(4)14
- describe,
1(1)66,
2(1)3,
2(1)34,
2(1)105,
2(2)159,
2(2)177,
2(3)230,
2(4)354,
2(4)390,
10(4)3,
11(4)21,
12(1)1,
12(2)11,
12(3)16,
12(4)21,
13(4)30,
13(4)34,
14(3)24,
14(3)27,
15(3)11,
15(3)13,
16(3)10,
16(3)12,
16(4)14,
17(2)5,
18(2)8
- equivalent,
11(2)4,
16(1)4,
17(1)1
- exposure,
8(1)119,
16(4)14
- how,
2(1)3,
2(2)138,
2(3)269,
10(2)5,
10(2)8,
10(4)1,
10(4)2,
10(4)5,
11(3)13,
11(4)18,
12(1)2,
12(2)9,
12(2)12,
12(3)18,
12(3)19,
13(1)10,
13(2)13,
13(3)25,
13(4)31,
13(4)36,
14(1)2,
14(3)26,
15(1)5,
15(3)14,
15(4)15,
16(1)3,
16(2)5,
16(2)8,
17(1)1,
17(1)2,
17(1)3,
17(4)15,
18(1)1,
18(1)3,
18(2)6,
18(3)9,
18(4)14
- implementation,
1(1)3,
1(1)26,
1(1)66,
2(1)34,
2(2)177,
2(4)390,
2(4)416,
11(1)2,
11(1)3,
11(1)4,
11(3)16,
11(4)18,
11(4)22,
12(1)1,
12(2)10,
12(2)11,
12(3)14,
12(4)22,
13(1)4,
13(3)26,
13(3)27,
14(1)3,
15(1)3,
15(2)8,
15(3)13,
15(4)16,
16(1)1,
16(1)2,
16(3)9,
16(3)10,
16(3)11,
16(4)13,
17(2)5,
17(2)8,
18(1)2,
18(1)3,
18(1)4
- insecure,
15(1)5
- Ioannidis, John,
5(2)95,
7(2)242
- layer, link-,
17(2)5
- link-layer,
17(2)5
- number,
9(2)181,
10(1)4,
10(2)5,
10(3)11,
10(3)12,
10(4)5,
11(1)2,
11(2)5,
11(3)12,
11(3)14,
11(3)15,
12(1)1,
12(1)2,
12(1)5,
12(1)6,
12(2)8,
12(2)9,
12(2)13,
12(3)16,
12(3)18,
12(4)21,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(4)32,
13(4)34,
14(1)11,
14(3)26,
14(4)31,
15(1)4,
15(2)7,
15(2)8,
15(4)15,
16(1)4,
16(2)7,
16(4)14,
16(4)16,
17(3)10,
17(4)16,
18(2)8
- packet,
2(3)269,
11(2)2,
11(3)15,
12(2)10,
12(2)11,
12(2)13,
12(4)22,
13(4)35,
14(1)5,
14(1)7,
15(2)6,
15(4)16
- paper,
1(1)66,
1(1)93,
2(1)34,
2(1)105,
2(2)138,
2(2)177,
2(3)269,
2(4)390,
9(2)162,
9(2)181,
9(4)421,
10(1)2,
10(1)4,
10(2)5,
10(2)7,
10(3)9,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
10(4)4,
11(1)2,
11(2)1,
11(2)6,
12(2)12,
14(4)28,
14(4)32
- partial,
12(2)8
- practical,
2(4)390,
4(2)158,
9(3)325,
10(2)6,
10(4)1,
11(2)1,
11(2)5,
11(4)18,
12(3)19,
14(1)7,
14(1)14,
14(2)20,
14(4)29,
15(1)4,
15(2)6,
15(2)7,
15(4)16,
16(3)10,
16(3)12,
16(4)13,
17(4)16,
18(1)3,
18(4)13
- present,
1(1)26,
2(1)3,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(3)295,
2(4)354,
9(2)181,
9(4)461,
10(1)2,
10(2)7,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
10(4)3,
11(1)2,
11(1)4,
11(2)2,
11(2)5,
11(3)14,
11(4)22,
12(1)2,
12(1)4,
12(2)10,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(3)17,
12(4)22,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(3)28,
13(4)29,
13(4)41,
14(1)4,
14(1)5,
14(1)6,
15(1)2,
15(2)6,
15(2)8,
15(2)10,
15(3)12,
15(3)13,
15(4)16,
15(4)18,
16(2)6,
16(2)7,
16(4)13,
16(4)14,
17(1)4,
17(2)6,
17(2)7,
17(2)8,
17(3)9,
17(3)12,
17(4)14,
17(4)15,
17(4)16,
18(1)3,
18(1)4,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- privacy,
1(1)66,
2(4)390,
10(3)12,
11(2)3,
11(2)6,
11(3)16,
12(1)6,
12(2)8,
12(2)9,
12(3)16,
12(4)21,
13(1)7,
13(2)16,
13(3)22,
13(3)24,
13(4)39,
14(1)4,
14(3)26,
14(4)29,
14(4)30,
14(4)31,
15(2)7,
15(3)12,
16(3)11,
16(3)12,
17(1)3,
17(3)10,
18(1)2,
18(4)12
- provide,
1(1)3,
1(1)93,
2(1)3,
2(1)34,
2(1)65,
2(1)105,
2(3)230,
2(4)390,
10(1)3,
10(2)8,
10(3)10,
10(4)2,
10(4)6,
11(1)3,
11(1)4,
11(2)2,
11(3)12,
11(3)13,
11(4)17,
11(4)20,
11(4)23,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)15,
12(3)16,
12(4)22,
13(3)22,
13(3)24,
13(4)31,
13(4)34,
13(4)38,
13(4)41,
14(1)4,
14(1)7,
14(1)8,
14(3)25,
14(4)28,
15(2)6,
15(2)10,
15(4)17,
15(4)18,
16(1)3,
16(2)5,
16(3)9,
16(3)11,
16(4)17,
17(2)5,
17(3)11,
17(3)12,
17(4)16,
18(1)1,
18(1)2,
18(2)5,
18(2)7,
18(4)13,
18(4)14
- recommendations,
16(1)2,
18(4)13
- recovery,
2(4)354,
9(4)421
- reduce,
2(3)295,
9(4)391,
11(3)14,
11(4)17,
12(2)13,
12(3)17,
13(3)27,
13(4)40,
14(1)12,
15(3)12,
16(1)4,
16(3)10,
16(4)17,
18(4)12,
18(4)13
- required,
10(2)5,
11(2)3,
11(3)15,
11(3)16,
12(1)6,
12(2)8,
12(3)16,
13(3)22,
13(4)29,
14(4)29,
16(4)15,
17(3)10,
17(4)16,
18(3)11
- Rubin, Aviel D.,
1(1)66
- Shamir,
9(4)461
- standard,
2(3)230,
2(4)416,
4(3)224,
10(2)8,
10(3)11,
10(3)12,
11(1)4,
11(2)4,
12(1)1,
12(3)18,
13(3)28,
13(4)35,
13(4)37,
13(4)41,
15(1)2,
16(1)2,
16(1)3,
16(3)10,
16(4)15,
17(3)11,
17(4)16,
18(4)14
- stream,
6(2)258,
10(4)4,
12(3)16,
13(3)28,
14(1)5,
14(3)26,
15(4)17,
16(3)10,
17(4)16,
18(1)4
- Stubblefield, Adam,
5(2)119
- used,
1(1)3,
2(1)65,
2(4)416,
9(2)181,
10(1)2,
10(2)5,
10(2)7,
10(2)8,
10(4)2,
11(1)2,
11(1)3,
11(2)3,
11(3)14,
11(3)15,
11(3)16,
11(4)21,
11(4)22,
12(2)8,
12(3)15,
13(1)10,
13(3)22,
13(3)25,
13(4)29,
13(4)34,
14(1)3,
14(1)12,
14(1)13,
14(3)27,
15(1)3,
15(1)5,
15(3)12,
15(4)17,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
17(1)1,
17(2)7,
17(3)9,
17(4)13,
18(1)3,
18(2)5,
18(2)6,
18(3)9,
18(4)13,
18(4)14
- vulnerability,
2(4)416,
12(2)11,
13(4)38,
14(1)7,
14(1)13,
17(1)1,
17(3)11
- wireless,
8(2)228,
9(2)162,
10(4)6,
11(2)1,
11(2)2,
11(3)12,
11(3)13,
11(3)14,
11(4)19,
11(4)22,
11(4)23,
14(1)5,
14(1)7,
17(2)5