izpis_h1_title_alt

Pregled ranljivosti novejših Wi-Fi protokolov
ID GABERŠČEK, EVA (Author), ID Zimic, Nikolaj (Mentor) More about this mentor... This link opens in a new window

.pdfPDF - Presentation file, Download (1,21 MB)
MD5: 982D7F9A5B65E0F5EF542F380273B9C2

Abstract
Diplomska naloga obravnava učinkovitost protokola WPA3. To je najnovejši varnostni algoritem za zaščito brezžične komunikacije. Zanima nas, kako se ta algoritem obnese v praksi ter kako se je z njegovim razvojem izboljšala varnost brezžične komunikacije. V prvem delu je napisan pregled predhodnih protokolov, to so WEP, WPA ter WPA2. Predstavi njihovo delovanje ter izpostavi njihove ranljivosti. Naslednji del je opis protokola WPA3. Vključuje podroben opis kriptografije, uporabljene pri šifriranju, ter razlago izpeljave ključa. Opisana je tudi primerjava s preteklimi protokoli, predstavljenimi v predhodnem poglavju. Delo se zaključi s sistematičnim pregledom napadov na protokola WPA2 in WPA3.

Language:Slovenian
Keywords:Wi-Fi, WPA3, SAE, omrežna varnost, napadi na brezžična omrežja
Work type:Bachelor thesis/paper
Typology:2.11 - Undergraduate Thesis
Organization:FRI - Faculty of Computer and Information Science
Year:2023
PID:20.500.12556/RUL-144721 This link opens in a new window
COBISS.SI-ID:147182595 This link opens in a new window
Publication date in RUL:09.03.2023
Views:725
Downloads:59
Metadata:XML RDF-CHPDL DC-XML DC-RDF
:
Copy citation
Share:Bookmark and Share

Secondary language

Language:English
Title:An overview of the vulnerabilities of newer Wi-Fi protocols
Abstract:
The thesis deals with the complexity of the WPA3 protocol. This is the latest wireless security algorithm. We are interested in how this algorithm works in practice, and how it impacts the security of wireless communication. The first part of the thesis provides an overview of previously used security protocols, specifically WEP, WPA and WPA2. It focuses on their operation and it highlights their vulnerabilities. Next part of the thesis is a description of the WPA3 protocol. It thoroughly explains the cryptography used in it's encryption and describes protocols key derivation. It also includes a comparison between past protocols and WPA3. The thesis concludes with a comprehensive overview of WPA2 and WPA3 attacks.

Keywords:Wi-Fi, WPA3, SAE, network security, wireless network attacks

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Back