Based on this new functionality, we identify sufficient criteria for protocols to provide universally composable key exchange and secure channels. Since these criteria are based on the new ideal functionality, checking the criteria requires merely information-theoretic or even only syntactical arguments, rather than involved reduction arguments.
As a case study, we use our method to analyze two central protocols of the IEEE 802.11i standard, namely the 4-Way Handshake Protocol and the CCM Protocol, proving composable security properties. As to the best of our knowledge, this constitutes the first rigorous cryptographic analysis of these protocols.
Category / Keywords: cryptographic protocols / simulation-based security Date: received 18 May 2010, last revised 11 Oct 2010 Contact author: tuengerthal at uni-trier de Available formats: PDF | BibTeX Citation Version: 20101011:201701 (All versions of this report) Discussion forum: Show discussion | Start new discussion