원문정보
초록
영어
This paper analyzes the existing formal security models of three-party authentication and key distribution protocol for 802.11i, which are extended BR and Extended CK models. We propose the flaw about the definition of session identifier in Extended CK model and present the limitation of matching conversation defined in Extended BR model .In order to fix these problems and provide a perfect model for provable security protocol, a new stronger formal security model of three-party authentication and key distribution protocol is defined by “efficient AP” according to the rules of 802.11i standard, and we present a new provable secure EAP-TLS protocol in our model. The new formal security model proposes a better method to design provable security three-party authentication and key distribution protocol in WLAN. In addition, this paper also suggests an idea to define the authentication relationships in special application environment.
목차
1. Introduction
2. Analysis of Security Models of Three-party Authentication andDistribution Protocol
2.1. Flaw of Definition in the Extended CK Model
2.2. The Security Problem of Extended BR Model
3. The Improved Security Model of Three-party Authentication and KeyDistribution Protocol
3.1. Adversarial Power
3.2. Security Definition
4. Protocol and Security Proof
5. Conclusion
References