|Publisher DOI:||10.1007/978-3-662-54388-7_12||Title:||A modular security analysis of EAP and IEEE 802.11||Language:||English||Authors:||Brzuska, Christopher
|Keywords:||forward secrecy;extensible authentication protocol;pseudorandom function;composition theorem;server session||Issue Date:||26-Feb-2017||Publisher:||Springer||Source:||Lecture Notes in Computer Science (10175 LNCS): 335-365 (2017)||Journal or Series Name:||Lecture notes in computer science||Abstract (english):||We conduct a reduction-based security analysis of the Extensible Authentication Protocol (EAP), a widely used three-party authentication framework. We show that the main EAP construction, considered as a 3P-AKE protocol, achieves a security notion which we call AKEw under the assumption that the EAP method employs channel binding. The AKEw notion resembles two-pass variant of the eCK model. Our analysis is modular and reflects the compositional nature of EAP. Furthermore, we show that the security of EAP can easily be upgraded by adding an additional key-confirmation step. This key-confirmation step is often carried out in practice in the form of a link-layer specific AKE protocol that uses EAP for bootstrapping its authentication. A concrete example of this is the extremely common IEEE 802.11 4-Way-Handshake protocol used in WLANs. Building on our modular results for EAP, we get as our second major result the first provable security result for IEEE 802.11 with upper-layer authentication.||Conference:||20th IACR International Conference on Practice and Theory in Public-Key Cryptography||URI:||http://hdl.handle.net/11420/4922||ISBN:||978-3-662-54388-7||ISSN:||1611-3349||Institute:||IT-Sicherheitsanalyse E-EXK1||Type:||InProceedings (Aufsatz / Paper einer Konferenz etc.)|
|Appears in Collections:||Publications without fulltext|
Show full item record
checked on Feb 23, 2020
Items in TORE are protected by copyright, with all rights reserved, unless otherwise indicated.