dc.contributor.advisor | Mjølsnes, Stig Frode | nb_NO |
dc.contributor.advisor | Eian, Martin | nb_NO |
dc.contributor.author | Lodhi, Ammar | nb_NO |
dc.date.accessioned | 2014-12-19T14:13:59Z | |
dc.date.available | 2014-12-19T14:13:59Z | |
dc.date.created | 2010-11-10 | nb_NO |
dc.date.issued | 2010 | nb_NO |
dc.identifier | 369192 | nb_NO |
dc.identifier | ntnudaim:5718 | nb_NO |
dc.identifier.uri | http://hdl.handle.net/11250/262363 | |
dc.description.abstract | This thesis is based upon the work of Beck and Tews [ 24 ]. It presents and experimentally Validate the Beck and Tews attack on a network with QoS client Associated with a Non- QoS AP.This is done by Slightly extending the source code Provided by Beck and Tews . A detailed study of the wireless security protocols has Also Been done followed by description of how the original Beck and Tews attack works.Martin Beck define a new approach of obtaining keystreams [ 1 ] Which has Been Thoroughly analyzed . A description of how the different packets are exceptional in obtaining more usable keystreams has Been dealer. The experimental validation of how extra keystream bytes are Obtained through the new approach [ 1 ] has Been done . This was done Using one of the network security tools. | nb_NO |
dc.language | eng | nb_NO |
dc.publisher | Institutt for telematikk | nb_NO |
dc.subject | ntnudaim:5718 | no_NO |
dc.subject | MSTCNNS Master of Telematics - Communication Networks and Networked Services (2 year) | no_NO |
dc.subject | Informasjonssikkerhet | no_NO |
dc.title | Cryptanalysis of IEEE 802.11i TKIP. | nb_NO |
dc.type | Master thesis | nb_NO |
dc.source.pagenumber | 87 | nb_NO |
dc.contributor.department | Norges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikk, Institutt for telematikk | nb_NO |