An Idea to Increase the Security of EAP-MD5 Protocol Against Dictionary Attack

12/04/2018
by   Behrooz Khadem, et al.
0

IEEE 802.1X is an international standard for Port-based Network Access Control which provides authentication for devices applicant of either local network or wireless local network. This standard defines the packing of EAP protocol on IEEE 802. In this standard, authentication protocols become a complementary part of network security. There is a variety in EAP family protocols, regarding their speed and security. One of the fastest of these protocols is EAP-MD5 which is the main subject of this paper. Moreover, in order to improve EAP-MD5 security, a series of attacks against it have been investigated. In this paper at first EAP-MD5 protocol is introduced briefly and a series of the dictionary attacks against it are described. Then, based on observed weaknesses, by proposing an appropriate idea while maintaining the speed of execution, its security against dictionary attack is improved.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/16/2022

On the necessity of separating MAC protocols into data and control planes

The network protocol architecture not only can be designed from the trad...
research
02/01/2023

A Robust Certificate Management System to Prevent Evil Twin Attacks in IEEE 802.11 Networks

The evil twin attack is a major security threat to WLANs. An evil twin i...
research
02/16/2022

NeVerMore: Exploiting RDMA Mistakes in NVMe-oF Storage Applications

This paper presents a security analysis of the InfiniBand architecture, ...
research
01/17/2022

Assessing the Security of the IEEE 802.15.6 Standard for Medical BANs

Medical Body Area Networks (MBANs) are ensembles of collaborating, poten...
research
02/09/2022

Security of EV-Charging Protocols

The field of electric vehicle charging involves a complex combination of...
research
02/21/2020

IMDfence: Architecting a Secure Protocol for Implantable Medical Devices

Over the past decade, focus on the security and privacy aspects of impla...
research
05/11/2020

Provably insecure group authentication: Not all security proofs are what they claim to be

A paper presented at the ICICS 2019 conference describes what is claimed...

Please sign up or login with your details

Forgot password? Click here to reset