Epstein Files Full PDF

CLICK HERE
Technopedia Center
PMB University Brochure
Faculty of Engineering and Computer Science
S1 Informatics S1 Information Systems S1 Information Technology S1 Computer Engineering S1 Electrical Engineering S1 Civil Engineering

faculty of Economics and Business
S1 Management S1 Accountancy

Faculty of Letters and Educational Sciences
S1 English literature S1 English language education S1 Mathematics education S1 Sports Education
teknopedia

  • Registerasi
  • Brosur UTI
  • Kip Scholarship Information
  • Performance
Flag Counter
  1. World Encyclopedia
  2. Simultaneous Authentication of Equals - Wikipedia
Simultaneous Authentication of Equals - Wikipedia
From Wikipedia, the free encyclopedia
Password-based authentication method

In cryptography, Simultaneous Authentication of Equals (SAE) is a password-based authentication and password-authenticated key agreement method.[1]

Authentication

[edit]

SAE is a variant of the Dragonfly Key Exchange defined in RFC 7664,[2] based on Diffie–Hellman key exchange using finite cyclic groups which can be a primary cyclic group or an elliptic curve.[1] The problem of using Diffie–Hellman key exchange is that it does not have an authentication mechanism. So the resulting key is influenced by a pre-shared key and the MAC addresses of both peers to solve the authentication problem.

Use

[edit]

IEEE 802.11s

[edit]
Main article: IEEE 802.11s

SAE was originally implemented for use between peers in IEEE 802.11s.[1] When peers discover each other (and security is enabled) they take part in an SAE exchange. If SAE completes successfully, each peer knows the other party possesses the mesh password and, as a by-product of the SAE exchange, the two peers establish a cryptographically strong key. This key is used with the "Authenticated Mesh Peering Exchange" (AMPE) to establish a secure peering and derive a session key to protect mesh traffic, including routing traffic.

WPA3

[edit]
Main article: WPA3

In January 2018, the Wi-Fi Alliance announced WPA3 as a replacement to WPA2.[3][4] The new standard uses 128-bit encryption in WPA3-Personal mode (192-bit in WPA3-Enterprise)[5] and forward secrecy.[6] The WPA3 standard also replaces the pre-shared key (PSK) exchange with Simultaneous Authentication of Equals as defined in IEEE 802.11-2016 resulting in a more secure initial key exchange in personal mode.[7][8] The Wi-Fi Alliance also claims that WPA3 will mitigate security issues posed by weak passwords and simplify the process of setting up devices with no display interface.[9]

Security

[edit]

In 2019 Eyal Ronen and Mathy Vanhoef (co-author of the KRACK attack) released an analysis of WPA3's Dragonfly handshake and found that "an attacker within range of a victim can still recover the password" and the bugs found "allow an adversary to impersonate any user, and thereby access the Wi-Fi network, without knowing the user's password."[10][11]

See also

[edit]
  • Extensible Authentication Protocol (EAP)
  • Key-agreement protocol
  • KRACK
  • IEEE 802.1X

References

[edit]
  1. ^ a b c Harkins, Dan (Aug 20, 2008). "Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks". 2008 Second International Conference on Sensor Technologies and Applications (Sensorcomm 2008). pp. 839–844. doi:10.1109/SENSORCOMM.2008.131. ISBN 978-0-7695-3330-8. S2CID 18401678 – via IEEE Xplore.
  2. ^ "Wi-Fi security gets a major update, but experts warn it's not big enough". www.cso.com.au.
  3. ^ Dawn Kawamoto (8 January 2018). "Wi-Fi Alliance Launches WPA2 Enhancements and Debuts WPA3". DARKReading.
  4. ^ "WPA3 protocol will make public Wi-Fi hotspots a lot more secure". TechSpot. 9 January 2018.
  5. ^ "Wi-Fi Alliance® introduces Wi-Fi CERTIFIED WPA3™ security | Wi-Fi Alliance". www.wi-fi.org. Retrieved 2018-06-26.
  6. ^ "The Next Generation of Wi-Fi Security Will Save You From Yourself". WIRED. Retrieved 2018-06-26.
  7. ^ "Wi-Fi CERTIFIED WPA3™ Program". Retrieved 2018-06-27.
  8. ^ "Wi-Fi Gets More Secure: Everything You Need to Know About WPA3". IEEE Spectrum: Technology, Engineering, and Science News. Sep 6, 2018.
  9. ^ "Wi-Fi Alliance® introduces security enhancements | Wi-Fi Alliance". www.wi-fi.org. Retrieved 2018-01-09.
  10. ^ "Dragonblood: Analysing WPA3's Dragonfly Handshake". 2019-04-10.
  11. ^ Vanhoef, Mathy; Ronen, Eyal (2019-04-10). "Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd". IEEE Symposium on Security & Privacy. IEEE.

Further reading

[edit]
  • Harkins, Dan (Aug 20, 2008). "Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks". 2008 Second International Conference on Sensor Technologies and Applications (Sensorcomm 2008). pp. 839–844. doi:10.1109/SENSORCOMM.2008.131. ISBN 978-0-7695-3330-8. S2CID 18401678 – via IEEE Xplore.
  • Vanhoef, Mathy; Ronen, Eyal (2019-04-10). "Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd". IEEE Symposium on Security & Privacy. IEEE.
  • v
  • t
  • e
IEEE standards
Current
  • 488
  • 693
  • 730
  • 754
    • Revision
  • 854
  • 828
  • 829
  • 896
  • 1003
  • 1014
  • 1016
  • 1076
  • 1149.1
  • 1154
  • 1164
  • 1275
  • 1278
  • 1284
  • 1355
  • 1394
  • 1451
  • 1497
  • 1516
  • 1541
  • 1547
  • 1584
  • 1588
  • 1596
  • 1603
  • 1613
  • 1619
  • 1666
  • 1667
  • 1675
  • 1685
  • 1722
  • 1733
  • 1800
  • 1801
  • 1815
  • 1849
  • 1850
  • 1855
  • 1900
  • 1901
  • 1902
  • 1904
  • 1905
  • 2030
  • 2050
  • 11073
  • 12207
  • 14764
  • 16085
  • 16326
  • 29148
  • 42010
802 series
802
  • .2
  • .4
  • .5
  • .6
  • .7
  • .8
  • .9
  • .10
  • .12
  • .14
  • .16
    • WiMAX · d · e
  • .17
  • .18
  • .20
  • .21
  • .22
  • .24
802.1
  • D
  • p
  • Q
  • Qav
  • Qat
  • Qay
  • Qaz
  • Qbb
  • w
  • X
  • AB
  • ad
  • AE
  • ag
  • ah
  • ak
  • aq
  • AS
  • AX (LACP)
  • BA
802.3
(Ethernet)
  • -1983
  • a
  • b
  • d
  • e
  • i
  • j
  • u
  • x
  • y
  • z
  • ab
  • ac
  • ad
  • ae
  • af
  • ah
  • ak
  • an
  • aq
  • at
  • au
  • av
  • az
  • ba
  • bt
  • bu
  • by
  • bz
  • ca
  • cb
  • cc
  • cd
  • ce
  • cg
  • ch
  • ck
  • cm
  • cn
  • cp
  • cq
  • cr
  • cs
  • ct
  • cu
  • cv
  • cw
  • cx
  • cy
  • cz
  • da
  • db
  • dd
  • de
  • df
802.11
(Wi-Fi)
  • -1997
  • legacy mode
  • a
  • b
  • c
  • d
  • e
  • f
  • g
  • h
  • i
  • j
  • k
  • n (Wi-Fi 4)
  • p
  • r
  • s
  • u
  • v
  • w
  • y
  • z
  • aa
  • ac (Wi-Fi 5)
  • ad (WiGig)
  • ae
  • af
  • ah
  • ai
  • aj
  • ak
  • aq
  • ax (Wi-Fi 6)
  • ay
  • az
  • ba
  • bb
  • bc
  • bd
  • be (Wi-Fi 7)
  • bf
  • bh
  • bi
  • bk
  • bn (Wi-Fi 8)
802.15
  • .1 (Bluetooth)
  • .2
  • .3
  • .4 (Zigbee)
  • .4a
  • .4b
  • .4c
  • .4d
  • .4e
  • .4f
  • .4g
  • .4z
  • .5
  • .6
  • .7
Proposed
  • P1363
  • P1699
  • P1823
  • P1906.1
Superseded
  • 754-1985
  • 830
  • 1219
  • 1233
  • 1362
  • 1364
  • 1471
  • Category
Retrieved from "https://teknopedia.ac.id/w/index.php?title=Simultaneous_Authentication_of_Equals&oldid=1283670064"
Categories:
  • Password authentication
  • Authentication protocols
  • Key-agreement protocols
  • Computer network security
  • Cryptographic protocols
  • IEEE 802.11
Hidden categories:
  • Articles with short description
  • Short description is different from Wikidata

  • indonesia
  • Polski
  • العربية
  • Deutsch
  • English
  • Español
  • Français
  • Italiano
  • مصرى
  • Nederlands
  • 日本語
  • Português
  • Sinugboanong Binisaya
  • Svenska
  • Українська
  • Tiếng Việt
  • Winaray
  • 中文
  • Русский
Sunting pranala
url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url
Pusat Layanan

UNIVERSITAS TEKNOKRAT INDONESIA | ASEAN's Best Private University
Jl. ZA. Pagar Alam No.9 -11, Labuhan Ratu, Kec. Kedaton, Kota Bandar Lampung, Lampung 35132
Phone: (0721) 702022
Email: pmb@teknokrat.ac.id