HOME JOURNALS CONTACT

Information Technology Journal

Year: 2007 | Volume: 6 | Issue: 7 | Page No.: 1108-1113
DOI: 10.3923/itj.2007.1108.1113
Perfect Forward Secrecy of Authentication and Key Exchange Protocols in Three Versions of WAPI
Chun-Jie Cao, Chao Yang, Xing-Hua Li, Yuan Bo Guo and Jian Feng Ma

Abstract: Wireless Local Area Networks (WLAN) are now being widely deployed for many applications, but security remains one of the most critical challenges yet to be fully addressed. Recently, a basic solution to this problem namely WLAN Authentication and Privacy Infrastructure (WAPI) provided by China Broadband Wireless IP Standard Group are proposed, which consisted of three versions. Nevertheless, this solution has some drawbacks: the Authentication and Key Exchange (AKE) protocols in WAPI cannot provide perfect forward secrecy. Moreover, the AKE protocol based on pre-shared keys of the last version of WAPI can be subject to off-line dictionary attacks. In this study, we first analysis the security of WAPI, then improvements on AKE protocols of WAPI are proposed.

Fulltext PDF Fulltext HTML

How to cite this article
Chun-Jie Cao, Chao Yang, Xing-Hua Li, Yuan Bo Guo and Jian Feng Ma, 2007. Perfect Forward Secrecy of Authentication and Key Exchange Protocols in Three Versions of WAPI. Information Technology Journal, 6: 1108-1113.

Related Articles:
© Science Alert. All Rights Reserved