Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 96 - Number 17
Year of Publication: 2014
![]() |
10.5120/16885-6896 |
Sukhchain Singh and Amit Grover. Article: Study and Analysis of Dictionary attack and Throughput in WEP for CRC-32 and SHA-1. International Journal of Computer Applications 96(17):15-18, June 2014. Full text available. BibTeX
@article{key:article, author = {Sukhchain Singh and Amit Grover}, title = {Article: Study and Analysis of Dictionary attack and Throughput in WEP for CRC-32 and SHA-1}, journal = {International Journal of Computer Applications}, year = {2014}, volume = {96}, number = {17}, pages = {15-18}, month = {June}, note = {Full text available} }
Abstract
Wirelesses Local Area Networks (WLANs) have become more prevalent and are widely deployed and used in many popular places like university campuses, airports, residences, cafes etc. With this growing popularity, the security of wireless network is also very important. In this work, the evaluation of CRC-32 and SHA-1 is performed by calculating the throughput and by running dictionary attack on both the algorithms. The analysis shows that SHA-1 is more secure that CRC-32.
References
- Maocai Wang, Guangming Dai, Hanping Hu, Lei Pen "Security Analysis for IEEE802. 11" IEEE 2008, pp. 1-3
- Ying Wang, Zhigang Jin, Ximan Zhao, "Practical Defence against WEP and WPA-PSK Attack for WLAN" IEEE 2010 6th International Conference on WiCOM, pp-1-4
- LIU Wu, DUAW Hai-xin,REN Ping, wu Jian-ping "Weakness Analysis and Attack Test for WLAN" IEEE 2010, pp. 387-391.
- Jyoti Wadhwani, Prof. Nitin Narkhede "Implementation of communication using Cyclic Redundancy" International Journal of Emerging Technology and Advanced Engineering , Volume 3, Issue 7, July 2013 , pp. 229-232
- Hasan Md. Mohtarim ,Ayesha Zaman,Nowrin Hoque "An approach for a Standard Polynomial for Cyclic Redundancy Check" International Journal of Computer Applications ,Volume 35– No. 2, December 2011, pp. 1-4
- Amit Keswani and Vaibhav Khadilkar "THE SHA-1 ALGORITHM" Lamar University Computer Science Department, Beaumont, TX 77710, USA
- P. Manickam, T. Guru Baskar , M. Girija , Dr. D. Manimegalai "Performance Comparison of Routing Protocols in Mobile ad hoc networks" International Journal of Wireless & Mobile Networks (IJWMN) ,Vol. 3, No. 1, February 2011, pp. 98-106
- Songhe Zhao and Charles A. Shoniregun "Critical Review of Unsecured WEP" IEEE 2007, IEEE Computer society , pp. 1-7
- Tarik Guelzim, M. S. Obaidat, Fellow"A New Counter Disassociation Mechanism (CDM) for 802. 11b/g Wireless Local Area Networks" IEEE 2009, pp. 251-259
- Longjun Zhang,TianqingMo A Signcryption Scheme for WEP in WLAN Based on Bilinear Pairings 201O International Conference on Computer Application and System Modeling (ICCASM 2010)
- Vishal Kumkar, Akhil Tiwari, Pawan Tiwari, Ashish Gupta, Seema Shrawne " Vulnerabilities of Wireless Security protocols (WEP and WPA2)" International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 2, April 2012 , pp. 35-38. .
- Swati Sukhija, Shilpi Gupta "Wireless Network Security Protocols A Comparative Study" International Journal of Emerging Technology and Advanced Engineering Website,Volume 2, Issue 1, January 2012, pp. 258-264
- Orest Kavka, Iurii Garasym, Valerii Dudykevych "The Analyses if wireless Communication Encryption Technologies. Modificated WEP Protocol" TCSET'2010, February 23-2010, Lviv-Slavske, Ukraine. pp. 186
- Ondiwa Nashon Odhiambo , E. Biermann & G. Noel, "An Integrated Security model for WLAN" IEEE AFRICON 2009 23 - 25 September 2009