By Topic

Research on the Optimization of Encryption and Authentication Mode of EAX about Broadband Wireless Communications Equipment

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Qingbo Zhang ; Commun. Technol. Inst., Ningbo Univ., Ningbo, China ; Jiaming He ; Liu Li

In broadband wireless communications, the security of terminal equipment becomes an important problem. At present, EAX is a popular encryption & authentication mode for terminal equipment. But the algorithm of EAX has two disadvantages: CTR (counter mode) and OMAC (one-key CBC MAC), the result is that wireless communications will be attacked easily and will influence security and speed of terminal equipment.In this paper, firstly, we analysis the theory of EAX mode, pointing out why it should be optimized. Then we propose an optimized PEAX encryption & authentication mode based on the two disadvantages of EAX encryption & authentication mode, including optimized RCTR (random-CTR) mode based on CTR and optimized POMAC mode based on OMAC. Finally the optimized PEAX mode is simulated with Visual C++. It is proved that PEAX mode is correct and predominant with improving the security and speed of wireless communications further.

Published in:

Computer Science and Information Engineering, 2009 WRI World Congress on  (Volume:1 )

Date of Conference:

March 31 2009-April 2 2009