Title :
ESKIMO 2-Way Handshake
Author :
Ahmed, Ishtiaq ; James, Ashish
Author_Institution :
Tecomex Forensics Ltd., Coventry, UK
Abstract :
Recent research has shown that there are many security issues associated with the original IEEE 4-Way Handshake. The most serious of these security issues is the key recovery attack, during which hackers are able to retrieve the secret key and use it to access a targeted network. In order to mitigate this serious security vulnerability, this research analysed the IEEE 4-Way Handshake and identified the source of the problem. Similarly, the research reviewed some proposed ideas on how to fix this very problem, but concluded that none of the proposed approaches is secure and efficient. Finally, this research proposes the new ESKIMO (Encryption System with Keyed Integrity and Managed Oracle) 2-Way Handshake, which incorporates a strong cryptographic Message Authentication Code (MAC) algorithm called ESMAC (ESKIMO MAC). This research argues that the ESKIMO 2-Way Handshake is secure and lightweight. It provides better security and efficiency, and also cuts down the original IEEE 4-Way Handshake scheduling time by at least fifty percent.
Keywords :
cryptography; wireless LAN; ESKIMO 2-way handshake; ESKIMO MAC; ESMAC; Encryption System with Keyed Integrity and Managed Oracle; IEEE 4-way handshake; hackers; key recovery attack; network access; scheduling time; secret key retrieval; security issues; serious security vulnerability mitigation; strong cryptographic MAC algorithm; strong cryptographic message authentication code algorithm; Authentication; Encryption; IEEE 802.11 Standards; Microwave integrated circuits; Wireless LAN; ESKIMO; ESKIMO 2-Way Handshake; ESMAC; IEEE 4-Way Handshake;
Conference_Titel :
Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on
Conference_Location :
Mysore
Print_ISBN :
978-1-4799-2432-5
DOI :
10.1109/ICACCI.2013.6637211