earticle

논문검색

A Stronger Formal Security Model of Three-party Authentication and Key Distribution Protocol for 802.11i

원문정보

초록

영어

This paper analyzes the existing formal security models of three-party authentication and key distribution protocol for 802.11i, which are extended BR and Extended CK models. We propose the flaw about the definition of session identifier in Extended CK model and present the limitation of matching conversation defined in Extended BR model .In order to fix these problems and provide a perfect model for provable security protocol, a new stronger formal security model of three-party authentication and key distribution protocol is defined by “efficient AP” according to the rules of 802.11i standard, and we present a new provable secure EAP-TLS protocol in our model. The new formal security model proposes a better method to design provable security three-party authentication and key distribution protocol in WLAN. In addition, this paper also suggests an idea to define the authentication relationships in special application environment.

목차

Abstract
 1. Introduction
 2. Analysis of Security Models of Three-party Authentication andDistribution Protocol
  2.1. Flaw of Definition in the Extended CK Model
  2.2. The Security Problem of Extended BR Model
 3. The Improved Security Model of Three-party Authentication and KeyDistribution Protocol
  3.1. Adversarial Power
  3.2. Security Definition
 4. Protocol and Security Proof
 5. Conclusion
 References

저자정보

  • Tao Wenjun Information Science and Technology Institute,Zhengzhou,China
  • Hu Bin Information Science and Technology Institute,Zhengzhou,China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.