SFD Text for Public Key Cryptography

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
Advertisements

Submission doc.: IEEE /1326r1 August 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Early Key Generation by ECDH and PKC Date:
Submission doc.: IEEE 11-12/0271r1 March 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Big IE Date: Authors: NameAffiliationsAddressPhone .
Submission doc.: IEEE /1167r0 August 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data IE Date: Authors: NameAffiliationsAddressPhone .
Submission doc.: IEEE /1124r0 August 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Example of IP address assignment using Generic Upper.
Doc.: IEEE /0059r3 Submission January 2010 Hiroki Nakano, Trans New Technology, Inc.Slide 1 An Example Protocol for FastAKM Date: Authors:
Doc.: IEEE /0598r0 Submission May 2012 Steve Grau, Juniper NetworksSlide 1 Layer 3 Setup with Dynamic VLAN Assignment Date: Authors:
Submission doc.: IEEE /1003r1 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
Submission doc.: IEEE 11-12/0273r8 May 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Upper Layers Date: Authors: NameAffiliationsAddressPhone .
Submission doc.: IEEE 11-12/0273r9 May 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Upper Layers Date: Authors: NameAffiliationsAddressPhone .
Submission doc.: IEEE 11-10/0701r0 May 2012 Hitoshi Morioka, Allied Telesis R&D CenterSlide 1 Supplemental Information for HLCF Date: Authors:
Submission doc.: IEEE /1003r2 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
Doc.: IEEE ai Submission NameAffiliationsAddressPhone George Calcev Huawei Technologies Co., Ltd. huawei.com TGai.
Submission doc.: IEEE ai May 2012 Lei Wang, InterDigital CommunicationsSlide 1 Proposed SFD Text for ai AP/STA Initiated FILS Optimizations.
Submission doc.: IEEE 11-12/0273r7 May 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Upper Layers Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE / wng Submission March 2012 Paul A. Lambert (Marvell)Slide 1 Security Framework Date: Authors:
Doc.: IEEE /1008r0 August 2010Hiroki Nakano, Trans New Technology, Inc.Slide 1 Parallel processing for upper layer Date: Authors: NameCompanyAddressPhone .
Doc.: IEEE /0896r0 SubmissionJae Seung Lee, ETRISlide 1 Probe Request Filtering Criteria Date: July 2012.
Submission doc.: IEEE 11-12/0273r5 March 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Upper Layers Date: Authors: NameAffiliationsAddressPhone .
Submission doc.: IEEE 11-12/0273r10 May 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Upper Layers Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0269r1 Submission NameAffiliationsAddressPhone ChengYan FengZTE Corporation No.800, Middle Tianfu Avenue, Hi-tech District, Chengdu,
Fast Initial Authentication
Higher Layer Packet Container Proposal Presentation
Access Control Mechanism for FILS
Month Year doc.: IEEE yy/xxxxr0 May 2012
Proposed SFD Text for ai Link Setup Procedure
Feasibility Study of FIA
TGai-Motion/Straw Poll-March-2013-Orlando
Discussions on FILS Authentication
IEEE for High Speed Mobility
Triggering the Broadcast Probe Response
FILS presentation on High Level Security Requirements
AP Discovery Information Broadcasting
More Example Ideas around FIA
More Example Ideas around FIA
Triggering the Broadcast Probe Response
An Example Idea of FIA Authors: Date: May 2010 Name Company
EAP based Message Flow Optimization for FILS
An Example Idea of FIA Authors: Date: May 2010 Name Company
IP Address assignment: Offline discussion summary
Feasibility Study of FIA
An Example Idea of FIA Authors: Date: May 2010 Name Company
Improvement on Active Scanning
An Example Protocol for FastAKM
Fast Authentication in TGai
MLME.SCAN-request Date: Authors: Nov 2012 Month Year
Scanning from Specific Channel
An Example Idea of FIA Authors: Date: May 2010 Name Company
Band adjustment for fasat AP discovery
Listen to Probe Request from other STAs
Fast Authentication in TGai : Updates to EAP-RP
Reducing Overhead in Active Scanning with Simulation Results
Access distribution in ai
Performance Analysis of authentication and authorization
An Example Protocol for FastAKM
FTM Frame Exchange Authentication
Reducing Overhead in Active Scanning with Simulation Results
TGai FILS: GAS/ANQP Signaling Reduction
Triggering the Broadcast Probe Response
Fast Authentication in TGai
Month Year doc.: IEEE yy/xxxxr0 May 2012
Access distribution in ai
Scanning from Specific Channel
On the Need for an ai Annex
Reducing Overhead in Active Scanning
GAS procedure in TGai Date: Authors: May 2012 Month Year
MLME.SCAN-request Date: Authors: Nov 2012 Month Year
Month Year doc.: IEEE yy/xxxxr0 May 2012
Multi-link Operation Framework
Multi-link Operation Framework
Presentation transcript:

SFD Text for Public Key Cryptography March 2012 doc.: IEEE 802.11-yy/xxxxr0 March 2012 SFD Text for Public Key Cryptography Date: 2012-03-03 Authors: Name Affiliations Address Phone email Hiroki Nakano Trans New Technology, Inc. Sumitomo Seimei Kyoto Bldg. 8F, 62 Tukiboko-cho, Shimogyo, Kyoto 600-8492 JAPAN +81-75-213-1200 cas@trans-nt.com Hiroki Nakano, Trans New Technology, Inc. Hiroki Nakano, Trans New Technology, Inc.

March 2012 doc.: IEEE 802.11-yy/xxxxr0 March 2012 Abstract This proposal includes the text intended for inclusion into Section 3 (Security Framework). Hiroki Nakano, Trans New Technology, Inc. Hiroki Nakano, Trans New Technology, Inc.

March 2012 doc.: IEEE 802.11-yy/xxxxr0 March 2012 Proposed SFD Text The TGai amendment defines the following schemes separately: STA (user) authentication (by AP), AP authentication (by STA) and key generation/management. The TGai amendment defines ECDH-based key agreement as one of the key generation/management methods. The TGai amendment defines methods using IETF X.509 Certificate as one of the AP authentication. The TGai amendment defines methods using IETF X.509 Certificate as one of the STA authentication. Hiroki Nakano, Trans New Technology, Inc. Hiroki Nakano, Trans New Technology, Inc.

March 2012 Terminology ECDH: Elliptic Curve Diffie-Hellman IETF X.509 Certificate: Public Key Certificate and its Revocation List defined by RFC5280 Hiroki Nakano, Trans New Technology, Inc.

March 2012 doc.: IEEE 802.11-yy/xxxxr0 March 2012 Intention of Text 1 Users and network designers currently use various authentication schemes such as Shared Secret through Public Key Certificate. TGai should make effort to satisfy their requirements. Hiroki Nakano, Trans New Technology, Inc. Hiroki Nakano, Trans New Technology, Inc.

March 2012 doc.: IEEE 802.11-yy/xxxxr0 March 2012 Intention of Text 2 ECDH have now become a reasonable option as a key generation algorithm. “NSA Suite B Cryptography” also specify use of ECDH as the key exchange algorithm. Hiroki Nakano, Trans New Technology, Inc. Hiroki Nakano, Trans New Technology, Inc.

March 2012 doc.: IEEE 802.11-yy/xxxxr0 March 2012 Intention of Text 3 IETF X.509 Certificate-based authentication for web servers is widely deployed. This is also used for Web- based authentication of wireless LAN networks. And also, IETF X.509 Certificate-based authentication is used by EAP-TTLS and EAP-PEAP. This text leads TGai amendment to support the equivalent level of security as such Web-based authentication technology when STA starts to communicate to new AP. Hiroki Nakano, Trans New Technology, Inc. Hiroki Nakano, Trans New Technology, Inc.

March 2012 doc.: IEEE 802.11-yy/xxxxr0 March 2012 Intention of Text 4 IETF X.509 Certificate-based user authentication is used by combination of EAP-TLS and IEEE802.1X. This text leads TGai amendment to support the equivalent level of security as EAP-TLS. Hiroki Nakano, Trans New Technology, Inc. Hiroki Nakano, Trans New Technology, Inc.

Straw poll 1 Do you support to include the following text in SFD. March 2012 doc.: IEEE 802.11-yy/xxxxr0 March 2012 Straw poll 1 Do you support to include the following text in SFD. “The TGai amendment defines the following schemes separately: STA (user) authentication (by AP), AP authentication (by STA) and key generation/management.” Yes: No: Abstain: Hiroki Nakano, Trans New Technology, Inc. Hiroki Nakano, Trans New Technology, Inc.

Straw poll 2 Do you support to include the following text in SFD. March 2012 doc.: IEEE 802.11-yy/xxxxr0 March 2012 Straw poll 2 Do you support to include the following text in SFD. “The TGai amendment defines ECDH-based key agreement as one of the key generation/management methods.” Yes: No: Abstain: Hiroki Nakano, Trans New Technology, Inc. Hiroki Nakano, Trans New Technology, Inc.

Straw poll 3 Do you support to include the following text in SFD. March 2012 doc.: IEEE 802.11-yy/xxxxr0 March 2012 Straw poll 3 Do you support to include the following text in SFD. “The TGai amendment defines methods using IETF X.509 Certificate as one of the AP authentication.” Yes: No: Abstain: Hiroki Nakano, Trans New Technology, Inc. Hiroki Nakano, Trans New Technology, Inc.

Straw poll 4 Do you support to include the following text in SFD. March 2012 doc.: IEEE 802.11-yy/xxxxr0 March 2012 Straw poll 4 Do you support to include the following text in SFD. “The TGai amendment defines methods using IETF X.509 Certificate as one of the STA authentication.” Yes: No: Abstain: Hiroki Nakano, Trans New Technology, Inc. Hiroki Nakano, Trans New Technology, Inc.

Backup March 2012 doc.: IEEE 802.11-yy/xxxxr0 March 2012 Hiroki Nakano, Trans New Technology, Inc. Hiroki Nakano, Trans New Technology, Inc.