Enhancement in The Identities-Exchange Process During The Authentication Process
Enhancement in The Identities-Exchange Process During The Authentication Process
Abstract: The key exchange is the most important target to the asymmetrical-encryption algorithms. Section 3 presents the
hackers. The asymmetrical encryption algorithms are used for enhancement in the Authentication Process. Section 4
the key-exchange in the authentication process. These presents the results. Finally, conclusion is presented in
algorithms help the authentication protocols to authenticate the section 5.
networks. The enhancement of the key-exchange and identities-
exchange is presented in this paper. The enhancement of the
key-exchange keeps the shared keys to be secure from the man-
2. Review on the Asymmetrical-Encryption
in-the-middle attacks. Algorithms
Keywords: Public key; Key-Updating; Secret Key; Shared In the RSA algorithm, the authentication server announces
Key. two keys and keeps two keys to be secret keys. The client
uses the two public keys to encrypt the message and the
1. Introduction authentication server uses one of the secret key to decrypt
the message. The RSA steps are as the following:
Wireless Local Area Network (WLAN) is one of the fastest- Step 1: Authentication server chooses two very large
growing technologies. The demand for connecting devices numbers p and q.
without the use of cables is increasing everywhere. WLAN Step 2: It calculates n = p × q
can be found in the office buildings, and in many other Step 3: It calculate φ = ( p − 1) × (q − 1)
public areas [1]. The security in WLAN is based on Step 4: It chooses a random integer e, and then determines d
cryptography, the science and art of transforming messages from the relation
to make them secure and immune to attacks. Cryptography
can be used to authenticate the sender and receiver of the d × e = 1modφ
message to each other within WLAN.
(1)
The data security in WLAN needs a key for encryption and
decryption processes [2]. The key exchange should be safer
Step 5: The client encrypts the plain text, p, with the two
to avoid the attacks to get that key. The authentication
keys, n and e.
protocols use an asymmetrical encryption algorithm for the
key exchange. The Diffie and Hellman [1], RSA [2], and
C=Pe mod n
Elliptic-Curve cryptography [2] are examples of the
(2)
asymmetrical encryption algorithms. These algorithms
depend on two types of keys, secret and public keys. The
Step 6: The authentication server decrypts C by using d and
client and server exchange a two authenticated keys used to
n to get P.
generate the key used for the encryption and decryption of
data.
P=Cd mod n
The authentication protocols have been used for
(3)
authentication and key-exchange processes, such as EAP-
The drawback of RSA is that clients in this network can
TLS [3], EAP-TTLS [4], and PEAP [5]. This paper is
analysis this encrypted message because all the clients have
organized as follows. Section 2 gives a short review of the
the same public keys to encrypt the message. This gives the
(IJCNS) International Journal of Computer and Network Security, 35
Vol. 1, No. 3, December 2009
man-in-the middle attacks to monitor the key-exchange determine d from the relation
process in the authentication process.
In the Diffie and Hellman, the authentication server d × e = 1 mod φ
announces two keys, p and g, and uses a secret key, x. The (8)
client has a secret key, y. The authentication server encrypts Step 5: It chooses a prime number, nk, to be a secret key in
its two public keys, p and g, by the secret key, x, see the authentication server.
equation (4), then sends the encrypted message Ks to the Step 6: It chooses a prime numbers, ns, for each client in
client. The client will use its secret key, y, to get the shared WLAN.
key, K, see equation (5). The client will send an encryption Step 7: It calculates shared key of the client, ks, from the
message, Kc, to the authentication server. Kc can be following equations.
obtained from equation (6). The authentication server will
use its secret key, x, to get the shared key, K, see equation nk = ns × pc
(7). The man-in- the middle attacks can easily exchange the qc = ns ⊕ nk
data with the authentication server from the starting point.
(9)
He can generate a secret key, y, and then obtain the shared
key, K, from the previous steps.
ks = ( pc × qc ) mod nk
5. Conclusion
Nabil M. A. Ayad received the B.S. in
Electronics and Electrical Communications
The authentication process is used to authenticate the clients
Department, Cairo University, Cairo,
and the authentication server in WLAN. The asymmetrical Egypt, June 1974, and M.S. in "A
encryption algorithm is used for key-exchange in the Microprocessor-Based Data Acquisition
authentication process. The enhancement of the key- System for Exchanges", April 1979, and
exchange process increases the difficulties to discover the the Ph.D in “Performance Evaluation of
shared key. The key-updating with each Identity-packet adds Routing Techniques for Packet- Switched
more difficulties to crack the WLAN environment. The Computer Networks”, Oct., 1984. From 1995 to 2002, He was an
authentication process becomes more secure because of the associate professor in the department of Reactors, Egyptian Atomic
key-exchange enhancement and the key-updating process. Energy Authority. Currently, he is a Professor in the department of
Reactors, Egyptian Atomic Energy Authority. He is interested in
Communication systems, Designing and implementing of PC
References business accounting packages Intelligent Database systems,
[1] F. Majstor, “WLAN security, threats and Evaluation of LAN performance, and Modeling of computer
solutions”,28th IEEE International Conference on networks.
Local Computer Networks, Bonn, Germany, Oct
2003.
Nawal El-Fishawy She received the PhD
[2] William Stallings, “Network Security Essentials degree in mobile communications the faculty of
(Applications and Standards)”, Pearson Education, Electronic Eng., Menoufia University, Menouf ،
2004. Egypt ،in collaboration with Southampton
[3] Simon, D., Aboba, B., and R. Hurst, "The EAP- University in 1991 .Now she is the head of
TLS Authentication Protocol", RFC 5216, March Computer Science and Engineering Dept.,
2008. Faculty of Electronic Eng. Her research interest
[4] P. Funk and S. Blake-Wilson, " EAP Tunneled includes computer communication networks
TLS Authentication Protocol Version 1 (EAP- with emphasis on protocol design, traffic modeling and
performance evaluation of broadband networks and multiple access
TTLSv1) ", The Internet Society, Mar. 2006.
control protocols for wireless communications systems and
[5] Palekar, A., Simon, D., Zorn, G., Salowey, J., networks. Now she directed her research interests to the
Zhou, H., and S. Josefsson, "Protected EAP developments of security over wireless communications networks
Protocol (PEAP) Version 2", work in progress, (mobile communications, WLAN, Bluetooth), VOIP, and
October 2004. encryption algorithms.
[6] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J.,
and H. Levkowetz, "Extensible Authentication
Protocol (EAP)", RFC 3748, June 2004.
[7] Simpson, W., "The Point-to-Point Protocol (PPP)",
STD 51, RFC 1661, July 1994.
[8] Kasera and N. Narang, "3G Mobile Networks -
Architecture, Protocols and Procedures", McGraw-
Hill, 2004.
Authors Profile