The provable security formal analysis of 802.11i authentication scheme

Song Yubo,Hu Aiqun,Yao Bingxin

Strategic Study of CAE ›› 2010, Vol. 12 ›› Issue (1) : 67 -73.

PDF (715KB)
Strategic Study of CAE ›› 2010, Vol. 12 ›› Issue (1) : 67 -73.

The provable security formal analysis of 802.11i authentication scheme

Author information +
History +
PDF (715KB)

Abstract

802.11i standard is proposed by IEEE 802.11 Standard Group to improve the security of the WLAN. In 802.11i, 802.1x standard is used for the authentication and access controll. How to analyze the security of the new protocol to prove its validity is the most interesting problem we are concerned. In order to solve this problem, an expanded Bellare-Rogaway model is established to give a provable security formal analysis on this protocol. By utilizing the expanded Bellare-Rogaway model, a flaw has been found in 802.1X authentication protocols and the corresponding man-in-the-middle attack is given here.

Keywords

802.11i / Bellare-Rogaway model / provable security / formal analysis

Cite this article

Download citation ▾
Song Yubo,Hu Aiqun,Yao Bingxin. The provable security formal analysis of 802.11i authentication scheme. Strategic Study of CAE, 2010, 12(1): 67-73 DOI:

登录浏览全文

4963

注册一个新账户 忘记密码

References

AI Summary AI Mindmap
PDF (715KB)

274

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/