CFP last date
20 December 2024
Reseach Article

Study and Analysis of Dictionary attack and Throughput in WEP for CRC-32 and SHA-1

by Sukhchain Singh, Amit Grover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 96 - Number 17
Year of Publication: 2014
Authors: Sukhchain Singh, Amit Grover
10.5120/16885-6896

Sukhchain Singh, Amit Grover . Study and Analysis of Dictionary attack and Throughput in WEP for CRC-32 and SHA-1. International Journal of Computer Applications. 96, 17 ( June 2014), 15-18. DOI=10.5120/16885-6896

@article{ 10.5120/16885-6896,
author = { Sukhchain Singh, Amit Grover },
title = { Study and Analysis of Dictionary attack and Throughput in WEP for CRC-32 and SHA-1 },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 96 },
number = { 17 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 15-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume96/number17/16885-6896/ },
doi = { 10.5120/16885-6896 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:21:59.657767+05:30
%A Sukhchain Singh
%A Amit Grover
%T Study and Analysis of Dictionary attack and Throughput in WEP for CRC-32 and SHA-1
%J International Journal of Computer Applications
%@ 0975-8887
%V 96
%N 17
%P 15-18
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wirelesses Local Area Networks (WLANs) have become more prevalent and are widely deployed and used in many popular places like university campuses, airports, residences, cafes etc. With this growing popularity, the security of wireless network is also very important. In this work, the evaluation of CRC-32 and SHA-1 is performed by calculating the throughput and by running dictionary attack on both the algorithms. The analysis shows that SHA-1 is more secure that CRC-32.

References
  1. Maocai Wang, Guangming Dai, Hanping Hu, Lei Pen "Security Analysis for IEEE802. 11" IEEE 2008, pp. 1-3
  2. Ying Wang, Zhigang Jin, Ximan Zhao, "Practical Defence against WEP and WPA-PSK Attack for WLAN" IEEE 2010 6th International Conference on WiCOM, pp-1-4
  3. LIU Wu, DUAW Hai-xin,REN Ping, wu Jian-ping "Weakness Analysis and Attack Test for WLAN" IEEE 2010, pp. 387-391.
  4. Jyoti Wadhwani, Prof. Nitin Narkhede "Implementation of communication using Cyclic Redundancy" International Journal of Emerging Technology and Advanced Engineering , Volume 3, Issue 7, July 2013 , pp. 229-232
  5. Hasan Md. Mohtarim ,Ayesha Zaman,Nowrin Hoque "An approach for a Standard Polynomial for Cyclic Redundancy Check" International Journal of Computer Applications ,Volume 35– No. 2, December 2011, pp. 1-4
  6. Amit Keswani and Vaibhav Khadilkar "THE SHA-1 ALGORITHM" Lamar University Computer Science Department, Beaumont, TX 77710, USA
  7. P. Manickam, T. Guru Baskar , M. Girija , Dr. D. Manimegalai "Performance Comparison of Routing Protocols in Mobile ad hoc networks" International Journal of Wireless & Mobile Networks (IJWMN) ,Vol. 3, No. 1, February 2011, pp. 98-106
  8. Songhe Zhao and Charles A. Shoniregun "Critical Review of Unsecured WEP" IEEE 2007, IEEE Computer society , pp. 1-7
  9. Tarik Guelzim, M. S. Obaidat, Fellow"A New Counter Disassociation Mechanism (CDM) for 802. 11b/g Wireless Local Area Networks" IEEE 2009, pp. 251-259
  10. Longjun Zhang,TianqingMo A Signcryption Scheme for WEP in WLAN Based on Bilinear Pairings 201O International Conference on Computer Application and System Modeling (ICCASM 2010)
  11. Vishal Kumkar, Akhil Tiwari, Pawan Tiwari, Ashish Gupta, Seema Shrawne " Vulnerabilities of Wireless Security protocols (WEP and WPA2)" International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 2, April 2012 , pp. 35-38. .
  12. Swati Sukhija, Shilpi Gupta "Wireless Network Security Protocols A Comparative Study" International Journal of Emerging Technology and Advanced Engineering Website,Volume 2, Issue 1, January 2012, pp. 258-264
  13. Orest Kavka, Iurii Garasym, Valerii Dudykevych "The Analyses if wireless Communication Encryption Technologies. Modificated WEP Protocol" TCSET'2010, February 23-2010, Lviv-Slavske, Ukraine. pp. 186
  14. Ondiwa Nashon Odhiambo , E. Biermann & G. Noel, "An Integrated Security model for WLAN" IEEE AFRICON 2009 23 - 25 September 2009
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption Dictionary attack Throughput