TUHH Open Research
Help
  • Log In
    New user? Click here to register.Have you forgotten your password?
  • English
  • Deutsch
  • Communities & Collections
  • Publications
  • Research Data
  • People
  • Institutions
  • Projects
  • Statistics
  1. Home
  2. TUHH
  3. Publication References
  4. A modular security analysis of EAP and IEEE 802.11
 
Options

A modular security analysis of EAP and IEEE 802.11

Publikationstyp
Conference Paper
Date Issued
2017-02-26
Sprache
English
Author(s)
Brzuska, Chris  
Jacobsen, Håkon  
Institut
IT-Sicherheitsanalyse E-EXK1  
TORE-URI
http://hdl.handle.net/11420/4922
First published in
Lecture notes in computer science  
Number in series
10175 LNCS
Start Page
335
End Page
365
Citation
Lecture Notes in Computer Science (10175 LNCS): 335-365 (2017)
Contribution to Conference
20th IACR International Conference on Practice and Theory in Public-Key Cryptography  
Publisher DOI
10.1007/978-3-662-54388-7_12
Scopus ID
2-s2.0-85014460773
Publisher
Springer
We conduct a reduction-based security analysis of the Extensible Authentication Protocol (EAP), a widely used three-party authentication framework. We show that the main EAP construction, considered as a 3P-AKE protocol, achieves a security notion which we call AKEw under the assumption that the EAP method employs channel binding. The AKEw notion resembles two-pass variant of the eCK model. Our analysis is modular and reflects the compositional nature of EAP. Furthermore, we show that the security of EAP can easily be upgraded by adding an additional key-confirmation step. This key-confirmation step is often carried out in practice in the form of a link-layer specific AKE protocol that uses EAP for bootstrapping its authentication. A concrete example of this is the extremely common IEEE 802.11 4-Way-Handshake protocol used in WLANs. Building on our modular results for EAP, we get as our second major result the first provable security result for IEEE 802.11 with upper-layer authentication.
Subjects
forward secrecy
extensible authentication protocol
pseudorandom function
composition theorem
server session
DDC Class
600: Technik
TUHH
Weiterführende Links
  • Contact
  • Send Feedback
  • Cookie settings
  • Privacy policy
  • Impress
DSpace Software

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science
Design by effective webwork GmbH

  • Deutsche NationalbibliothekDeutsche Nationalbibliothek
  • ORCiD Member OrganizationORCiD Member Organization
  • DataCiteDataCite
  • Re3DataRe3Data
  • OpenDOAROpenDOAR
  • OpenAireOpenAire
  • BASE Bielefeld Academic Search EngineBASE Bielefeld Academic Search Engine
Feedback