Authenticated key exchange for wireless security | IEEE Conference Publication | IEEE Xplore

Authenticated key exchange for wireless security


Abstract:

Authenticated key exchange (AKE) protocols are designed to allow mutual authentication and generation of a cryptographically-secure session key. We revisit the convention...Show More

Abstract:

Authenticated key exchange (AKE) protocols are designed to allow mutual authentication and generation of a cryptographically-secure session key. We revisit the conventional AKE protocols employed in IEEE 802.1x for wireless security considering the following situation: (1) a user has some insecure devices with built-in memory capacity; (2) the counterpart server is not perfectly secure; (3) neither PKI (public key infrastructure) nor TRM (tamper-resistant module) is available. In addition, the paper introduces a new kind of AKE protocol, which is secure against an active attacker in the above-mentioned situation, in order to enhance the overall security level and usability of passwords. For authenticity, the user's password is combined with an additional secret stored on insecure mobile devices. Nevertheless, the user remembers only one relatively short password while maintaining its connections with a variety of different servers.
Date of Conference: 13-17 March 2005
Date Added to IEEE Xplore: 02 May 2005
Print ISBN:0-7803-8966-2

ISSN Information:

Conference Location: New Orleans, LA, USA

Contact IEEE to Subscribe

References

References is not available for this document.