The provable security formal analysis of 802.11i authentication scheme

Song Yubo、Hu Aiqun、Yao Bingxin

Strategic Study of CAE ›› 2010, Vol. 12 ›› Issue (1) : 67-73.

PDF(715 KB)
PDF(715 KB)
Strategic Study of CAE ›› 2010, Vol. 12 ›› Issue (1) : 67-73.

The provable security formal analysis of 802.11i authentication scheme

  • Song Yubo、Hu Aiqun、Yao Bingxin

Author information +
History +

Abstract

802.11i standard is proposed by IEEE 802.11 Standard Group to improve the security of the WLAN. In 802.11i, 802.1x standard is used for the authentication and access controll. How to analyze the security of the new protocol to prove its validity is the most interesting problem we are concerned. In order to solve this problem, an expanded Bellare-Rogaway model is established to give a provable security formal analysis on this protocol. By utilizing the expanded Bellare-Rogaway model, a flaw has been found in 802.1X authentication protocols and the corresponding man-in-the-middle attack is given here.

Keywords

802.11i / Bellare-Rogaway model / provable security / formal analysis

Cite this article

Download citation ▾
Song Yubo,Hu Aiqun,Yao Bingxin. The provable security formal analysis of 802.11i authentication scheme. Strategic Study of CAE, 2010, 12(1): 67‒73
AI Summary AI Mindmap
PDF(715 KB)

Accesses

Citations

Detail

Sections
Recommended

/