Show simple item record

dc.contributor.advisorMjølsnes, Stig Frodenb_NO
dc.contributor.advisorEian, Martinnb_NO
dc.contributor.authorLodhi, Ammarnb_NO
dc.date.accessioned2014-12-19T14:13:59Z
dc.date.available2014-12-19T14:13:59Z
dc.date.created2010-11-10nb_NO
dc.date.issued2010nb_NO
dc.identifier369192nb_NO
dc.identifierntnudaim:5718nb_NO
dc.identifier.urihttp://hdl.handle.net/11250/262363
dc.description.abstractThis thesis is based upon the work of Beck and Tews [ 24 ]. It presents and experimentally Validate the Beck and Tews attack on a network with QoS client Associated with a Non- QoS AP.This is done by Slightly extending the source code Provided by Beck and Tews . A detailed study of the wireless security protocols has Also Been done followed by description of how the original Beck and Tews attack works.Martin Beck define a new approach of obtaining keystreams [ 1 ] Which has Been Thoroughly analyzed . A description of how the different packets are exceptional in obtaining more usable keystreams has Been dealer. The experimental validation of how extra keystream bytes are Obtained through the new approach [ 1 ] has Been done . This was done Using one of the network security tools.nb_NO
dc.languageengnb_NO
dc.publisherInstitutt for telematikknb_NO
dc.subjectntnudaim:5718no_NO
dc.subjectMSTCNNS Master of Telematics - Communication Networks and Networked Services (2 year)no_NO
dc.subjectInformasjonssikkerhetno_NO
dc.titleCryptanalysis of IEEE 802.11i TKIP.nb_NO
dc.typeMaster thesisnb_NO
dc.source.pagenumber87nb_NO
dc.contributor.departmentNorges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikk, Institutt for telematikknb_NO


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record