Doc.: IEEE 802.11-11/12-0378-00-0wng Submission March 2012 Paul A. Lambert (Marvell)Slide 1 Key Centric Identity Date: 12-03-12 Authors:

Slides:



Advertisements
Similar presentations
Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Advertisements

Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
Doc.: IEEE /0357r0 Submission March 2011 Marc Emmelmann, Fraunhofer FOKUSSlide 1 A focused path torwards TGai D1.0 Date: Authors:
Doc.: IEEE /0159r0 Submission January 2014 Clint Chaplin, Chair (Samsung)Slide 1 Closing Report Date: Authors:
Doc.: IEEE /1448 r00 Submission Paul A. Lambert, Marvell SemiconductorSlide Privacy Date: Authors: November 2013.
1 Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing From : ePrint (August 2005) Author : Junghyun Nam, Seungjoo.
Doc.: IEEE /0573r1 Submission May 2012 David Halasz, Motorola MobilitySlide 1 Scalable Authentication Date: Authors:
Doc.: IEEE /0357r1 Submission March 2010 Clint Chaplin, Chair (Samsung)Slide 1 WNG SC Agenda Date: Authors:
Doc.: IEEE Submission March 2003 Carl R. Stevenson, Agere Systems Motion to Motion by: StevensonSeconded.
Doc.: IEEE /0893 r00 Submission July 2013 Paul A. Lambert, Marvell SemiconductorSlide 1 Service Discovery Proposal Date: Authors: Previous.
Doc.: IEEE /1533r0 Submission November 2014 Clint Chaplin, Chair (Samsung)Slide 1 Closing Report Date: Authors:
Doc.: IEEE /0888 r00 Submission Paul A. Lambert, Marvell SemiconductorSlide 1 Security and Privacy Enhancements for Date: Authors:
Doc.: IEEE /2778r1 Submission November 2007 Sandra Qin et al., SamsungSlide 1 Content Protection Support in Date: Authors:
Doc.: IEEE /1164 r00 Submission September 2013 Paul A. Lambert, Marvell SemiconductorSlide 1 Some Par and 5C Requirements Date: Authors:
Doc: IEEE xxx Submission March 2015 Jeongseok Yu et al., Chung-Ang University Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /1262 r03 Submission Paul A. Lambert, Marvell SemiconductorSlide 1 Service Identifiers and Bloom Filters Date: Authors: May.
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
Doc.: IEEE /0114r1 Agenda January 2013 Clint Chaplin, Chair (Samsung)Slide 1 WNG SC Agenda Date: Authors:
CIA AAA. C I A Confidentiality I A Confidentiality Integrity A.
Doc.: IEEE / wng Submission March 2012 Paul A. Lambert (Marvell)Slide 1 Security Framework Date: Authors:
Doc.: IEEE /1212r0 Submission September 2011 IEEE Slide 1 The Purpose and Justification of WAPI Comparing Apples to Apples, not Apples to.
Doc.: IEEE /2179r0 Submission July 2007 Steve Emeott, MotorolaSlide 1 Summary of Updates to MSA Overview and MKD Functionality Text Date:
Doc.: IEEE / wng Submission March 2012 Paul A. Lambert (Marvell)Slide Simulations Date: Authors:
Liaison Report Date: Authors: January 2012
March 2010 doc.: IEEE < > March 2010
Closing Report Date: Authors: November 2010 November 2010
TGaq Pre-Association Summary
Closing Report Date: Authors: March 2010 March 2010
Closing Report Date: Authors: July 2012 July 2012
March 2001 Optional MAC-Level Security Enhancements for Home WLANs Carlos Rios LinCom Wireless Carlos Rios, LinCom Wireless.
Liaison Report Date: Authors: January 2012
Motions for 2007/09 Date: Authors: September 2007
Changes From D8.00 to D9.00 Date: Authors: January 2008
Closing Report Date: Authors: March 2015 July 2013
Generic Mechanism Across Multiple Technologies / SDOs
November 2010 doc.: IEEE < > November 2010
Closing Report Date: Authors: July 2011 July 2011
Closing Report Date: Authors: November 2012 November 2012
Sub 1 GHz license-exempt operation Closing Report for September 2010
MAC address assignment in IEEE through IEEE aq
Closing Report Date: Authors: January 2010 January 2010
Report on Date: Authors: March 2016 July 2013
Closing Report Date: Authors: July 2015 July 2013
Report on Date: Authors: November 2016 July 2013
Closing Report Date: Authors: May 2011 May 2011
Closing Report Date: Authors: November 2011 November 2011
WNG SC Agenda Date: Authors: November 2015 July 2013
Closing Report Date: Authors: January 2010 January 2010
Report on Date: Authors: March 2019 July 2013
Liaison Report Date: Authors: January 2012
March Liaison Report Date: Authors: March 2010
IEEE Task Group r (Fast Roaming) Opening Report May 2008
Changes From D6.00 to D6.10 Date: Authors: July 2007
Changes From D6.00 to D7.00 Date: Authors: July 2007
WNG SC Agenda Date: Authors: November 2015 July 2013
Closing Report Date: Authors: January 2015 July 2013
Closing Report Date: Authors: May 2010 May 2010
WNG Closing Report Date: Authors: July 2014 January 2013
WNG SC Closing Report Date: Authors: May 2019 July 2013
Liaison Report Date: Authors: September 2010
Report on Date: Authors: January 2019 July 2013
TGr Closing Report for May 2008
Report on Date: Authors: May 2019 July 2013
Closing Report Date: Authors: May 2012 May 2012
WNG SC Closing Report Date: Authors: May 2019 July 2013
SG Operating Rules Anybody can vote, present, and make motions
Closing Report Date: Authors: September 2010 September 2010
WNG SC Closing Report Date: Authors: May 2019 July 2013
Report on Date: Authors: July 2019 July 2013
Closing Report Date: Authors: July 2013 July 2013
Presentation transcript:

doc.: IEEE / wng Submission March 2012 Paul A. Lambert (Marvell)Slide 1 Key Centric Identity Date: Authors:

doc.: IEEE / wng Submission Public Key Based Authentication November 2011 Clint Chaplin, Chair (Samsung)Slide 2 Private Key Public Key Public Keys can be openly shared Key pairs are used in an authentication exchange that proves that an entity “holds” a particular public key K 1 K 2

doc.: IEEE / wng Submission Identity Public keys are the primary authentication mechanism Why not use public keys as a primary identity? –Most identifiers require central coordination (like MAC address, DNS names, etc) –Public keys are large numbers that are by definition unique March 2012 Clint Chaplin, Chair (Samsung)Slide 3

doc.: IEEE / wng Submission Access Control with Public Keys as Identity November 2011 Clint Chaplin, Chair (Samsung)Slide 4 Can K 1 enter network? K 1 K 2 Access control servers do NOT need to hold any secrets

doc.: IEEE / wng Submission Hashing Public Keys Public keys can be large Hashing can be used to create a smaller and still unique identifier March 2012 Clint Chaplin, Chair (Samsung)Slide 5

doc.: IEEE / wng Submission Hashing Keys to Form Addresses Public keys can even be used as an address using a hash March 2012 Clint Chaplin, Chair (Samsung)Slide 6 46 bits of hash(K 1, Ni)