TY - CHAP
T1 - An improved password authentication key exchange protocol for 802.11 environment
AU - Yu, Su Jung
AU - Song, Joo Seok
PY - 2003
Y1 - 2003
N2 - In this paper, we propose a password authentication key exchange protocol for WLANs (Wireless LANs). We call the proposed protocol as the improved EAP-SPEKE (Extensible Authentication Protocol-Simple Password Encrypted Key Exchange). The improved EAP-SPEKE protocol supports mutual authentication and key derivation. The proposed protocol does not require any modification to the IEEE 802.1X and EAP. Before the protocol begins, the server and client compute one modulo exponentiation. Once the protocol begins, the server and client need to compute another exponentiation for mutual authentication. On the contrary, the EAP-SRP needs to compute two modulo exponentiation during the protocol. The client and server authenticate each other with three message exchanges. Therefore, the number of exchanged message decreases by one compared with the EAP-SRP. Besides, the improved EAP-SPEKE protocol works on the the ECC (Elliptic Curve Cryptosystems) base as well as the DH (Diffie-Hellman) base.
AB - In this paper, we propose a password authentication key exchange protocol for WLANs (Wireless LANs). We call the proposed protocol as the improved EAP-SPEKE (Extensible Authentication Protocol-Simple Password Encrypted Key Exchange). The improved EAP-SPEKE protocol supports mutual authentication and key derivation. The proposed protocol does not require any modification to the IEEE 802.1X and EAP. Before the protocol begins, the server and client compute one modulo exponentiation. Once the protocol begins, the server and client need to compute another exponentiation for mutual authentication. On the contrary, the EAP-SRP needs to compute two modulo exponentiation during the protocol. The client and server authenticate each other with three message exchanges. Therefore, the number of exchanged message decreases by one compared with the EAP-SRP. Besides, the improved EAP-SPEKE protocol works on the the ECC (Elliptic Curve Cryptosystems) base as well as the DH (Diffie-Hellman) base.
UR - http://www.scopus.com/inward/record.url?scp=35248851565&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=35248851565&partnerID=8YFLogxK
U2 - 10.1007/3-540-44843-8_22
DO - 10.1007/3-540-44843-8_22
M3 - Chapter
AN - SCOPUS:35248851565
SN - 354040161X
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 201
EP - 209
BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
A2 - Kumar, Vipin
A2 - Kumar, Vipin
A2 - Gavrilova, Marina L.
A2 - Tan, Chih Jeng Kenneth
A2 - Tan, Chih Jeng Kenneth
A2 - L’Ecuyer, Pierre
PB - Springer Verlag
ER -