2008
DOI: 10.1007/978-3-540-68914-0_19
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of EAP-GPSK Authentication Protocol

Abstract: Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authentication methods for the EAP framework. We analyze the protocol and find three weaknesses: a repairable Denial-of-Service attack, an anomaly with the key derivation function used to create a short-term master session key, and a ciphersuite downgrading attack. We propose fixes to these anomalies, and use a finite-state verification tool … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…This can be partially explained by the difficulty to do a manual and thorough security analysis of complex distributed network protocols. There are some works that propose a security analysis of the design of network protocols based on model checking (e.g., [12,13,9]) . All past works check a given network configuration with a predetermined set of participants.…”
Section: Related Workmentioning
confidence: 99%
“…This can be partially explained by the difficulty to do a manual and thorough security analysis of complex distributed network protocols. There are some works that propose a security analysis of the design of network protocols based on model checking (e.g., [12,13,9]) . All past works check a given network configuration with a predetermined set of participants.…”
Section: Related Workmentioning
confidence: 99%
“…Since the thrive of the wireless LAN, cellular networks, ad hoc and sensor networks, there are a great number of fresh vulnerabilities and novel attacks discovered on different wireless networks [1,11,17,19,23,26,31]. This paper mainly focuses on the DoS attacks, especially on protocols of wireless LAN.…”
Section: Related Workmentioning
confidence: 99%
“…It is a popular direction to use model checkers to automatically find vulnerabilities in protocols [21][22][23]25 [21][22][23]. Among them, EAP-GPSK analysis [23] is most related to our work.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…carried out a formal correctness proof for the IEEE 802.11i and Transport Layer Security (TLS) protocols using PCL with a new form of PCL composition principle—staged composition . In addition, PCL was applied to the Internet Engineering Task Force Group Domain of Interpretation (IETF GDOI) protocol , Extensible Authentication Protocol‐Generalized Pre‐Shared Key (EAP-GPSK) Authentication Protocol , and Contract‐Signing Protocols . Improvements on PCL . A uniform notation and semantic setting was presented, and some previous technical definitions and proofs were developed in .…”
Section: Introductionmentioning
confidence: 99%