期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Security enhancement of WAPI access authentication protocol (WAI) 被引量:2
1
作者 刘永磊 金志刚 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第6期42-46,共5页
In this paper, the current known attack methods against WAI and the improvements of WAI called WAI' were analyzed. Through analyzing the unicast key agreement protocol in the WAI' by CPN model, the vulnerabilities o... In this paper, the current known attack methods against WAI and the improvements of WAI called WAI' were analyzed. Through analyzing the unicast key agreement protocol in the WAI' by CPN model, the vulnerabilities of WAI' were found out. The improvement of WAI' was made and a new protocol called WAI' - E was proposed. The WAI' -E was combined with the key exchange mechanism of Diffie-HeUman based on el- liptic curve cryptography. Moreover, by using CK mode, it is the fact that WAI'-E was SK-secure with PFS and was nrovided with inde^nendant sacuritv ,f cartifient~ mlthentientinn wn~ nravgd 展开更多
关键词 WLAN WLAN authentication and privacy Infrastructure Colored Petri Nets CK model
下载PDF
Security analysis of newly ameliorated WAPI protocol 被引量:3
2
作者 庞辽军 李慧贤 王育民 《Journal of Southeast University(English Edition)》 EI CAS 2008年第1期25-28,共4页
Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is ... Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is analyzed with the CK (Canetti-Krawczyk) model and the BAN (Burrows-Abadi- Needham) logic. Results show that it can achieve the alleged authentication and key negotiation goals. Besides those alleged, further analyses indicate that the authentication access process can satisfy other security requirements, such as mutual identity authentication, mutual key control, key confirmation, message integrity check, etc. If the used elliptic curve encryption algorithm and the hash algorithm are secure enough, the protocol can efficiently realize mutual authentication between STAs (station) and APs (access point). Therefore, WAPI can be applied to replace the security mechanism used in the original WLAN international standard to enhance its security. 展开更多
关键词 wireless local area network (WLAN) WLAN authentication and privacy infrastructure (WAPI) authentication key negotiation CK model
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部