Download now Free registration required
This paper analyzes the existing formal security models of three-party authentication and key distribution protocol for 802.11i, which are extended BR and Extended CK models. The authors propose the flaw about the definition of session identifier in Extended CK model and present the limitation of matching conversation defined in Extended BR model. In order to fix these problems and provide a perfect model for provable security protocol, a new stronger formal security model of three-party authentication and key distribution protocol is defined by "Efficient AP" according to the rules of 802.11i standard, and they present a new provable secure EAP-TLS protocol in their model.
- Format: PDF
- Size: 324.26 KB