Compared with the original standard, the greatest change that WAPI (Chinese WLAN security standard) implementation plan made lies in the key-agreement protocol in WAI (Wireless Authentication Infrastructure). This contribution presents a security analysis of the WAI module in the implementation plan with the Canetti-Krawczyk (CK) model. The results indicate that if the elliptic curve encryption scheme ECES adopted is secure against adaptive chosen ciphertext attack (CCA2 attack), then its key-agreement protocol is secure in the CK model, and it realizes the mutual identity authentication between STA (station) and AP (access point). © Springer-Verlag Berlin Heidelberg 2006.
CITATION STYLE
Li, X., Moon, S. J., & Ma, J. (2006). On the security of the authentication module of Chinese WLAN standard implementation plan. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3989 LNCS, pp. 340–348). Springer Verlag. https://doi.org/10.1007/11767480_23
Mendeley helps you to discover research relevant for your work.