Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Strategic Study of CAE >> 2010, Volume 12, Issue 1

The provable security formal analysis of 802.11i authentication scheme

Research Center of Information Security, Southeast University, Nanjing 210096, China

Funding project:国家242信息安全计划(2007A04);江苏省自然科学基金资助项目(BK2006108) Received: 2007-12-22 Revised: 2008-02-20 Available online: 2010-01-14 13:32:38.000

Next Previous

Abstract

802.11i standard is proposed by IEEE 802.11 Standard Group to improve the security of the WLAN. In 802.11i, 802.1x standard is used for the authentication and access controll. How to analyze the security of the new protocol to prove its validity is the most interesting problem we are concerned. In order to solve this problem, an expanded Bellare-Rogaway model is established to give a provable security formal analysis on this protocol. By utilizing the expanded Bellare-Rogaway model, a flaw has been found in 802.1X authentication protocols and the corresponding man-in-the-middle attack is given here.

Figures

图1

References

[ 1 ] IEEE 802.11.Information technology ― Telecommunications and information exchange between systems ― Local and metropolitan area networks ― Specific requirements ― Part 11 : Wireless LAN Medium Access Control ( MAC) and Physical Layer( PHY) Speci- fications[ S] .America, ISO /IEC, 1999 ,17 -21

[ 2 ] Nikita Borisov, Ian Goldberg, David Wagner.Intercepting mobile communications: the insecurity of 802.11 [ A ] .MobiCom ’ 01 : Proceedings of the 7 th Annual International Conference on Mobile Computing and Networking[ C] .New York:ACM Press,2001 :180 – 189

[ 3 ] Arbaugh W A, Shankar N,Wan Y J .Your 802.11 wireless net- work has no clothes [ EB /OL ] . http: //www.cs.umd.edu /~ waa /wireless.pdf,2001 ,3

[ 4 ] Arbaugh W A.An inductive chosen plaintext attack against WEP / WEP2 [ N] .IEEE Document 802.11 -01 /230 ,2001 ,5

[ 5 ] Walker J R.Unsafe at any key size; an analysis of the WEP en- capsulation[ N] .IEEE Document 802.11 -00 /362 ,2000 ,10

[ 6 ] IEEE802.11i.IEEE Standard for information technology -Tele- communications and information exchange between systems -Local and metropolitan area networks -Specific requirements part 11 : Wireless LAN Medium Access control ( MAC) and Physical Layer ( PHY) specifications: Medium Access Control ( MAC ) Security Enhancements[ S] .America, ISO /IEC, 2004 :1 -341

[ 7 ] IEEE802.1x.IEEE Standard for Local and Metropolitan Area Net- works – Port -Based Network Access Control [ S ] .America, ISO /IEC, 2001 ,1 -167

[ 8 ] GoldWasser S , Micali S.Probabilistic encryption [ J ] .Journal Computer and System Sciences,1984 ,4 ( 28 ) :270 – 299 link1

[ 9 ] Micali S, Rackoff C,Sloan R.The notion of security for probabilis- tic cryptosystems[ J] .SIAMJ.of Computing, 1988 ,4 :412 -426 link1

[10] Yao A C.Theory and applications of trapdoor functions[ A] .In Proceedings of the 23 rd Symposium on Foundations of Computer Science[ C] .IEEE, 1982

[11] Goldreich O.A uniform complexity treatment of encryption and zero -knowledge[ J] .Journal of Cryptology, 2003 ,6 :21 – 53 link1

[12] Luby M. Pseudorandomness and Cryptiographic Applications [ M] .New York: Princeton University Press, 2006

[13] Bellare M,Rogaway P.Entity authentication and key distribution [ A] .In Cryptology - Crypto 03 Proceedings[ C] .Lecture Notes in Computer Science, 2004 :232 -249

[14] Bellare M,Rogaway P.Provably secure session key distribution: the three party case[ A] .Proc.27 th Annual Symposium on the Theory of Computing[ C] .ACM, 2005 :57 -66

[15] Bellare M, Canetti R, Krawczyk H.A modular approach to the design and analysis of authentication and key exchange protocols [ A] .Proc.30 th Annual Symposium on the Theory of Computing [ C] .ACM, 1998 : 419 -428

[16] Bellare M, Pointcheval D, Rogaway P.Authenticated key ex- change secure against dictionary attacks[ A] .Cryptology - Eu- rocrypt 2000 Proceedings [ C ] .Lecture Notes in Computer Sci- ence, 2000 :135 -155

Related Research