On the security of the authentication module of chinese WLAN standard implementation plan

  • Authors:
  • Xinghua Li;SangJae Moon;Jianfeng Ma

  • Affiliations:
  • Key Laboratory of Computer Networks and Information, Security (Ministry of Education), Xidian University, Xi'an, China;Mobile Network Security Technology Research Center, Kyungpook National University, Sankyuk-dong, Buk-ku, Daegu, Korea;Key Laboratory of Computer Networks and Information, Security (Ministry of Education), Xidian University, Xi'an, China

  • Venue:
  • ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Compared with the original standard, the greatest change that WAPI (Chinese WLAN security standard) implementation plan made lies in the key-agreement protocol in WAI (Wireless Authentication Infrastructure). This contribution presents a security analysis of the WAI module in the implementation plan with the Canetti-Krawczyk (CK) model. The results indicate that if the elliptic curve encryption scheme ECES adopted is secure against adaptive chosen ciphertext attack (CCA2 attack), then its key-agreement protocol is secure in the CK model, and it realizes the mutual identity authentication between STA (station) and AP (access point).