number and a lower computation overhead. Another
research area is the extendibility to a general proto-
col model that provides a negotiation mechanism for
crypto primitives and hash functions.
Finally there is a need do develop an implementa-
tion for WiMax networks in order to demonstrate the
applicability of EAP-SRP-256 to different communi-
cation systems.
REFERENCES
Aboba, B., Blunk, L., Vollbrecht, J., and Carlson, J. (2004).
Extensible authentication protocol (EAP). RFC 3748.
(Obsoletes RFC 2284).
Aboba, B. and Simon, D. (1999). PPP EAP TLS authenti-
cation protocol. RFC 2716.
Bellare, M., Pointcheval, D., and Rogaway, P. (2000). Au-
thenticated key exchange secure against dictionary at-
tacks. Lecture Notes in Computer Science, 1807:139.
Bellare, M. and Rogaway, P. (2000). The AuthA proto-
col for password-based authenticated key exchange.
Technical report. Contribution to the IEEE P1363
study group for Future PKC Standards.
Bernard Aboba, e. a. (2006). Extensible authentication pro-
tocol (EAP) key management framework. IETF Inter-
net draft (Work in Progress).
Bersani, F. and Tschofenig, H. (2007). The EAP-PSK pro-
tocol: A pre-shared key extensible authentication pro-
tocol (EAP) method. RFC 4764.
Daemen, J. and Rijmen, V. (2002). The Design of Rijndael.
Springer-Verlag New York, Inc., Secaucus, NJ, USA.
ISBN 3540425802.
Diffie, W. and Hellman, M. E. (1976). New directions in
cryptography. IEEE Transactions on Information The-
ory, IT-22(6):644–654.
Dobbertin, H., Knudsen, L. R., and Robshaw, M. J. B.
(2004). The cryptanalysis of the AES - a brief sur-
vey. In AES Conference, pages 1–10.
Dolev, D. and Yao, A. C. (1981). On the security of public
key protocols. Technical report, Stanford, CA, USA.
Dworkin, M. (2001). Recommendation for block cipher
modes of operation - methods and techniques. NIST
Special Publication 800-38A, National Institute of
Standards and Technology.
Eastlake, D., Schiller, J. I., and Crocker, S. (2005). Ran-
domness requirements for security. RFC 4086.
Ferguson, N. and Schneier, B. (2003). Practical Cryptog-
raphy. Wiley Publishing Inc. ISBN 0-471-22894-X.
Funk, P. (2005). EAP tunneled TLS authentication protocol
version 0 (EAP-TTLSv0). IETF Internet draft (Work
in Progress).
Gilbert, H. (2003). The security of one-block-to-many
modes of operation. Springer-Verlag LNCS, FSE
03(2287):376–395. ISBN 3-540-20449-0.
Heintze, N. and Tygar, J. D. (1996). A model for secure pro-
tocols and their compositions. Software Engineering,
22(1):16–30.
Hoffman, P. and Schneier, B. (2005). Attacks on crypto-
graphic hashes in internet protocols. RFC 4270.
Keller, S. S. (2005). NIST-Recommended random number
generator based on ANSI X9.31 Appendix A.2.4 us-
ing the 3-key triple DES and AES algorithms. NIST
Information Technology Laboratory - Computer Se-
curity Division, National Institute of Standards and
Technology.
Koblensky, M. (2006). Implementazione del protocollo di
autenticazione EAP-SRP-256. Master Thesis at the
Dipartimento di Sistemi e Informatica, Universita’ di
Firenze, Italy.
Krawczyk, H., Bellare, M., and Canetti, R. (1997). HMAC:
Keyed-hashing for message authentication. RFC
2104.
Luby, M. and Rackoff, C. (1988). How to construct pseudo-
random permutations from random functions. SIAM J.
Computing, Vol. 17 No. 2.
Manganaro, A. (2005). Studio di un metodo di autenti-
cazione per le reti wireless basato sul protocollo SRP-
6. Master Thesis at the Dipartimento di Sistemi e In-
formatica, Universita’ di Firenze, Italy.
Millen, J. and Shmatikov, V. (2003). Symbolic protocol
analysis with products and diffie-hellman exponentia-
tion. In Proceedings of the 16th IEEE Computer Se-
curity Foundations Workshop., Asilomar, USA.
Palekar, A., Simon, D., Salowey, J., Zhou, H., Zorn, G., and
Josefsson, S. (2004). Protected EAP protocol (PEAP)
version 2. IETF Internet draft (Work in Progress).
Skoudis, E. (2002). Counter Hack - A step-by-step Guide
to Computer Attacks and Effective Defenses. Prentice
Hall PTR. ISBN 0-13-033273-9.
Stanley, e. a. ( 2005). EAP method requirements for WLAN.
RFC 4017.
Taylor, D., Wu, T., Mavrogiannopoulos, N., and Perrin, T.
(2006). Using SRP for TLS authentication. IETF In-
ternet draft (Work in Progress).
Wagner, D. and Schneier, B. (1996). Analysis of the SSL
3.0 protocol. In Proceedings of the Second USENIX
Workshop on Electronic Commerce, Oakland, Califor-
nia.
Wu, T. (1997). The secure remote password protocol. In
Proceedings of the 1998 Internet Society Network and
Distributed System Security Symposium, pages 97–
111, San Diego, CA.
Wu, T. (October 2002). SRP-6: Improvements and refine-
ments to the secure remore password protocol. Sub-
mission to the IEEE P1363 Working Group.
Zhao, Z., Dong, Z., and Wang, Y. (2006). Security analysis
of a password-based authentication protocol proposed
to IEEE 1363. Theor. Comput. Sci., 352(1):280–287.
WINSYS 2007 - International Conference on Wireless Information Networks and Systems
16