期刊文献+

CCMP协议的量化可验安全分析

Concrete provable security analysis of CCMP protocol
下载PDF
导出
摘要 为了分析无线局域网IEEE802.11i标准中替换存在严重安全问题的WEP协议的CCMP协议的安全性能,利用Bellare的量化可验安全模型对CCMP建立形式化分析模型,从数据机密性保护和完整性保护两个方面,建立与攻击者攻击成功的概率有关的优势函数对CCMP协议进行量化可验分析.分析表明,CCMP协议的认证性和机密性对应的攻击成功概率分别为O(n)×2-64和O(n2)×2-128.该协议设计达到了预期的安全设计目标,满足无线局域网安全需求. The security of the CCMP (counter mode with cipher block chaining message authentica- tion code protocol), which is involved in IEEE 802. 11 i working group to substitute the WEP (wired equivalent privacy) protocol with seriously security problem, is discussed. A concrete provable security analysis method is adopted to analyze the data confidentiality and integrity of the CCMP protocol. The results show that the CCMP can provide a capability of security with O(n)×2^-64 and O (n^2) × 2^-128 probability of successful attacking to confidentiality and integrity respectively. The CC- MP protocol has achieved the anticipated design goals, and can satisfy the security requirements of the WLAN( wireless local area network).
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第2期206-210,共5页 Journal of Southeast University:Natural Science Edition
基金 国家高技术研究发展计划(863计划)资助项目(2007AA01Z432 2007AA01Z433) 江苏省自然科学基金资助项目(BK2006108) 华为基金资助项目 国家242信息安全计划资助项目(2007A04).
关键词 无线局域网 CCMP 可验安全分析 wireless local area network(WLAN) counter mode with cipher block chaining messageauthentication code protocol(CCMP) provable security analysis
  • 相关文献

参考文献12

  • 1IEEE Standard 802. 11i. IEEE standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements part 11 : wireless LAN medium access control (MAC) and physical layer (PHY) specifications : medium access control (MAC) security enhancements[ S ]. New York: Institute of Electrical and Electronics Engineers, 2004.
  • 2IEEE Standard 802:11. Wireless LAN medium access control ( MAC ) and physical layer ( PHY ) specifications[ S ]. New York: Institute of Electrical and Electronics Engineers, 1999.
  • 3Lipmaa H, Rogaway P, Wagner D. CTR : counter mode encryption [EB/OL ]. ( 2003-06-09 ) [ 2007-04- 09 ]. http://csrc. nist. gov/CryptoToolkit/modes/prop- osedmodes/ctr/.
  • 4ISO. IS08372-87 Information processing. Modes of operation for a 642bit block cipher algorithm [ EB/ OL]. [2007-04-06 ]. http://www. eos. org. eg/web- en/cat/items/d15530. html.
  • 5吴文玲,冯登国.分组密码工作模式的研究现状[J].计算机学报,2006,29(1):21-36. 被引量:40
  • 6Bellare M, Namprempre C. Authenticated encryption: relations among notions and analysis of the generic composition paradigm [ C ]//Advances in Cryptology-Asiacrypt 2000. Berlin, Springer Verlag, 2000 : 531 - 545.
  • 7Bellare M, Desai A, J0kipii E, et al. A concrete security treatment of symmetric encryption: analysis of the DES modes of operation [ C ]//Proceedings of 38th Annual Symposium on Foundations of Computer Science. Miami Beach, Florida, 1997 : 394 - 403.
  • 8Bellare M, Kilian J, Rogaway P. The security of the cipher block chaining message authentication code[J].Journal of Computer and System Sciences, 2000, 61 (3) : 362 - 399.
  • 9Krawczyk H. The order of encryption and authentication for protecting communications [ C ]//Advances in Cryptology--CRYPTO. Santa Barbara, California, USA: Springer Verlag, 2001:310-331.
  • 10宋宇波,胡爱群,蔡天佑.WLAN802.11/11b数据加密机制的安全分析[J].中国工程科学,2004,6(10):32-38. 被引量:1

二级参考文献32

  • 1吴文玲.Pseudorandomness of Camellia-Like Scheme[J].Journal of Computer Science & Technology,2006,21(1):82-88. 被引量:5
  • 2IEEE Standard 802.11. Wireless LAN medium access control ( MAC ) and physical layer (PHY) specifications [ S ].1999 Edition.
  • 3Wi-Fi Alliance. Wi-Fi protected access (WPA) version 1.2[S]. C Brian Grimm , Wi-Fi Alliance, December 16,2002.
  • 4Winget N, Housley R, Wagner D, et al. Security flaws in 802.11 data link protocols [ C ]. Communications of the ACM, May 2003.46(5) :35 - 39.
  • 5Diffie W, Van Oorschot P, Wiener M. Authentication and authenticated key exchanges [ J ]. Designs, Codes and Cryptography, 1992,2(2): 107 - 125.
  • 6Biham M, Micall S. How to generate cryptographically strong sequences of pseudo-random bits [ J]. SLAM Journal on Computing, 1984,13(4): 850 - 864.
  • 7Bellare M, Desai A, Jokipii E, et al. A conrete security treatment of symmetric encryption: Analysis of the DES modes of operation[A]. Proc of the 38th IEEE FOCS[C].1997.
  • 8Abdalla M, Bellare M. Increasing the lifetime of a key: A comparative analysis of the security of re-keying techniques[A]. Advances in Cryptology - Asiacrypt 2000, Tatsuaki Okamoto, editor, volume 1976 of Lecture Notes in Computer Science[ C ] . Springer-Verlag, 2000.
  • 9Walker J R. Unsafe at any key size: An analysis of the WEP encapsulation[ EB/OL]. IEEE Document 802.11-00/362, Oct 2000. http: 11grouper. ieec. org/groups/802/11/Documents/index. html
  • 10Simon D, Aboba B, Moore T. IEEE 802.11 security and 802. 1x[ EB/OL ]. IEEE Document 802.11-00/034r1, Mar 2000. http: 11grouper. ieec. org/groups/802/11/Documents/index. html

共引文献43

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部