Abstract

By Ahmed M. El-Nagar, Ahmed A. Abd El-hafez & 1 more. A new Extensible Authentication Protocol-Moderate Weight Extensible Authentication Protocol (EAP-MEAP) is proposed and properties were verified using the specialized model checker AVISPA.

Highlights

  • B -> A : {Start,Sid}(Sessionk((Ks),(Hash((Ks),Nc)))) 9.A ->B : {Sid,Nd} (Sessionk((Ks),(Hash((Ks),Nc)))) 10.B -> A :{Connected}(Nsessionk((Ks),(Hasha((Ks),Nd)))) 11.A ->B :{Connected,Ok}(Nsessionk((Ks),(Hasha((Ks),Nd)))) knowledge A :B,Ks,Id,Password,Meap; B :A,Ks,Hello; session_instances [A:client,B:server,Hash:kd,Ks:ks,Start:start,Ok:ok,Id:id,Password:password,Con nected:connected,Sessionk:ke,Hasha:kc,Nsessionk:kn,Sid:sid]; intruder_knowledge client, server; goal B authenticates A on Na; A authenticates B on Nb; secrecy_of Password [ A,B]; secrecy_of Id [ A,B]; secrecy_of Sid []; secrecy_of Start [ ]; secrecy_of Ok[A,B]; secrecy_of Connected []; 10

  • ‫القوات المسلحة‪ ،‬جمهورية مصر العربية‬ ‫الكلية الفنية العسكرية‪ ،‬جمهورية مصر العربية‬ ‫جامعة عين شمس ‪ ،‬جمهورية مصر العربية‬ ‫الملخص‪:‬‬

Read more

Summary

Introduction

Public-Key (Certificated) Approach EAP-TLS (EAP-Transport Layer Security)

Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.