Strategic Study of CAE >> 2010, Volume 12, Issue 1
The provable security formal analysis of 802.11i authentication scheme
Research Center of Information Security, Southeast University, Nanjing 210096, China
Next Previous
Abstract
802.11i standard is proposed by IEEE 802.11 Standard Group to improve the security of the WLAN. In 802.11i, 802.1x standard is used for the authentication and access controll. How to analyze the security of the new protocol to prove its validity is the most interesting problem we are concerned. In order to solve this problem, an expanded Bellare-Rogaway model is established to give a provable security formal analysis on this protocol. By utilizing the expanded Bellare-Rogaway model, a flaw has been found in 802.1X authentication protocols and the corresponding man-in-the-middle attack is given here.
Keywords
802.11i ; Bellare-Rogaway model ; provable security ; formal analysis
References
[ 1 ] IEEE 802.11.Information technology ― Telecommunications and information exchange between systems ― Local and metropolitan area networks ― Specific requirements ― Part 11 : Wireless LAN Medium Access Control ( MAC) and Physical Layer( PHY) Speci- fications[ S] .America, ISO /IEC, 1999 ,17 -21
[ 2 ] Nikita Borisov, Ian Goldberg, David Wagner.Intercepting mobile communications: the insecurity of 802.11 [ A ] .MobiCom ’ 01 : Proceedings of the 7 th Annual International Conference on Mobile Computing and Networking[ C] .New York:ACM Press,2001 :180 – 189
[ 3 ] Arbaugh W A, Shankar N,Wan Y J .Your 802.11 wireless net- work has no clothes [ EB /OL ] . http: //www.cs.umd.edu /~ waa /wireless.pdf,2001 ,3
[ 4 ] Arbaugh W A.An inductive chosen plaintext attack against WEP / WEP2 [ N] .IEEE Document 802.11 -01 /230 ,2001 ,5
[ 5 ] Walker J R.Unsafe at any key size; an analysis of the WEP en- capsulation[ N] .IEEE Document 802.11 -00 /362 ,2000 ,10
[ 6 ] IEEE802.11i.IEEE Standard for information technology -Tele- communications and information exchange between systems -Local and metropolitan area networks -Specific requirements part 11 : Wireless LAN Medium Access control ( MAC) and Physical Layer ( PHY) specifications: Medium Access Control ( MAC ) Security Enhancements[ S] .America, ISO /IEC, 2004 :1 -341
[ 7 ] IEEE802.1x.IEEE Standard for Local and Metropolitan Area Net- works – Port -Based Network Access Control [ S ] .America, ISO /IEC, 2001 ,1 -167
[ 8 ] GoldWasser S , Micali S.Probabilistic encryption [ J ] .Journal Computer and System Sciences,1984 ,4 ( 28 ) :270 – 299 link1
[ 9 ] Micali S, Rackoff C,Sloan R.The notion of security for probabilis- tic cryptosystems[ J] .SIAMJ.of Computing, 1988 ,4 :412 -426 link1
[10] Yao A C.Theory and applications of trapdoor functions[ A] .In Proceedings of the 23 rd Symposium on Foundations of Computer Science[ C] .IEEE, 1982
[11] Goldreich O.A uniform complexity treatment of encryption and zero -knowledge[ J] .Journal of Cryptology, 2003 ,6 :21 – 53 link1
[12] Luby M. Pseudorandomness and Cryptiographic Applications [ M] .New York: Princeton University Press, 2006
[13] Bellare M,Rogaway P.Entity authentication and key distribution [ A] .In Cryptology - Crypto 03 Proceedings[ C] .Lecture Notes in Computer Science, 2004 :232 -249
[14] Bellare M,Rogaway P.Provably secure session key distribution: the three party case[ A] .Proc.27 th Annual Symposium on the Theory of Computing[ C] .ACM, 2005 :57 -66
[15] Bellare M, Canetti R, Krawczyk H.A modular approach to the design and analysis of authentication and key exchange protocols [ A] .Proc.30 th Annual Symposium on the Theory of Computing [ C] .ACM, 1998 : 419 -428
[16] Bellare M, Pointcheval D, Rogaway P.Authenticated key ex- change secure against dictionary attacks[ A] .Cryptology - Eu- rocrypt 2000 Proceedings [ C ] .Lecture Notes in Computer Sci- ence, 2000 :135 -155