期刊文献+

Security analysis of newly ameliorated WAPI protocol 被引量:3

新完善的WAPI协议安全性分析(英文)
下载PDF
导出
摘要 Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security. 在深入研究中国无线局域网安全标准WAPI接入鉴别过程的基础上,利用CK模型并结合BAN逻辑,对其认证和密钥协商过程安全性进行了形式化分析,证明其能够实现所声称的各种认证及密钥协商目标.进一步的分析结果表明,WAPI不仅具有所声称的各种安全属性,同时还能够有效地实现实体间相互认证、密钥的相互控制、密钥确认、消息完整性校验等安全属性.如果协议中所采用的椭圆曲线加密算法和杂凑算法足够安全,则该协议能够实现STA和AP之间的相互身份认证,可以用于替代原来的无线局域网国际标准中的安全机制,以增强无线局域网的安全性.
出处 《Journal of Southeast University(English Edition)》 EI CAS 2008年第1期25-28,共4页 东南大学学报(英文版)
基金 The National Basic Research Program of China(973Program) (No.G1999035805) the Natural Science Foundation of ShannxiProvince (No.2007F37) China Postdoctoral Science Foundation (No.20060401008,20070410376).
  • 相关文献

参考文献10

  • 1Branch J,,Petroni N,van Doorn L,et al.Autonomic802·11 wireless LAN security auditing[].IEEE Security and Priva- cy.2004
  • 2.Information technology-local and metropolitan area networks-specific requirements—part11: wireless LAN medium access control (MAC) and physical layer (PLY) specifications[].GB·—.2003
  • 3GB15629·11—2003/XG1 . 2006
  • 4Canetti R,Krawczyk H.Analysis of key-exchange protocols and their use for building secure channels[].Proc of Ad- vances in Cryptology—EUROCRYPT.2001
  • 5Canetti R,Krawczyk H.Universally composable notions of key exchange and secure channels[].Proc of Advances in Cryptology—EUROCRYPT.2002
  • 6Cramer R,Shoup V.A practical public-key cryptosystem provably secure against adaptive chosen ciphertextattack[].Proc of Advances in Cryptology— CRYPTO.1998
  • 7Boyd C,Mao W,Paterson K.Key agreement using statically keyed authenticators[].Proc of thend International Conference on Applied Cryptography and Network Security.2004
  • 8Bellare M,Canetti R,Krawczyk H.A modular approach to the design and analysis of authentication and key-exchange protocols[].Proc of theth Annual Symposium on The- ory of Computing.1998
  • 9David,J.,Jesse,W.Overview of IEEE 802.16 Security[].IEEE Security and Privacy.2004
  • 10MITCHELL C T,,WARD M,WILSON P.Key con-trol in key agreement protocols[].IEEE ElectronicsLetters.1998

同被引文献20

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部