Group Key Optimizations

Slides:



Advertisements
Similar presentations
Draft-ietf-pim-port-06. port-06 update Changes made in response to second wglc comments and following discussion Many minor editorial issues fixed Changed.
Advertisements

S A B D C T = 0 S gets message from above and sends messages to A, C and D S.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Doc.: IEEE /551r0 Submission September 2002 Moore, Roshan, Cam-WingetSlide 1 TGi Frame Exchanges Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget.
Doc.: IEEE /684r0 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 1 Extended Keymap ID Martin Lefkowitz Trapeze Networks.
BAI513 - PROTOCOLS ARP BAIST – Network Management.
Doc.: IEEE /0707r0 Submission July 2003 N. Cam-Winget, et alSlide 1 Establishing PTK liveness during re-association Nancy Cam-Winget, Cisco Systems.
Submission doc.: IEEE /1034r4 September 2012 Jeongki Kim, LG ElectronicsSlide 1 Enhanced scanning procedure for FILS Date: Authors:
Csci388 Wireless and Mobile Security – Key Hierarchies for WPA and RSN
Doc.: IEEE /0896r0 SubmissionJae Seung Lee, ETRISlide 1 Probe Request Filtering Criteria Date: July 2012.
Draft-gu-ppsp-tracker-protocol-04 Presenter : Gu Yingjie IETF-81, Quebec, July, 2011.
Proposed solutions to comments on section 7
Robust Security Network (RSN) Service of IEEE
WiFi Troubleshooting & Performance Monitoring
Y.-H. Chen International College Ming-Chuan University Fall, 2004
Open issues with PANA Protocol
Lecture 29 Security in IEEE Dr. Ghalib A. Shah
Steganography Example
Keying for Fast Roaming
doc.: IEEE /xxxr0 Mike Moreton
802.1X and key interactions Tim Moore November 2001
WUR MAC issues follow-up
TGi Motions for Comment Resolution
ATTACKS ON WINZIP ENCRYPTION
Motions to Address Some Letter Ballot 52 Comments
Microsoft Ignite NZ October 2016 SKYCITY, Auckland.
Martin Lefkowitz Trapeze Networks
Mesh Security Proposal
Wireless Network Security
Using Upper Layer Message IE in TGai
Use of EAPOL-Key messages during pre-auth
PEKM (Post-EAP Key Management Protocol)
802.11i MIB variable name fixes
Issue Discussion: KeyRSC (43)
Integrity Check for Disassociate/Associate/Re-associate
Binary Data representation
July 2002 Threat Model Tim Moore Tim Moore, Microsoft.
Security for Measurement Requests and Information
Security for Measurement Requests and Information
doc.: IEEE /457 Mathilde Benveniste AT&T Labs, Research
Bandwidth # of bits per second that can be sent.
Fast Authentication in TGai : Updates to EAP-RP
Proposal for Extensible Security
Jesse Walker and Emily Qi Intel Corporation
Security for Measurement Requests and Information
AES Associated Data Optimization
Overview of Changes to Key Holder Frame Formats
AP Power Down Notification
Tim Moore, Microsoft Corporation Clint Chaplin, Symbol Technologies
doc.: IEEE /454r0 Bob Beach Symbol Technologies
Fast Roaming Compromise Proposal
Sleep Mode with AP Filtering
Roaming timings and PMK lifetime
Mesh Security Proposal
EAPOL-Key Clarifications
Fast Roaming Compromise Proposal
Fast Roaming Compromise Proposal
Dan Harkins Trapeze Networks
Roaming timings and PMK lifetime
Keying for Fast Roaming
Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget Cisco Systems, Inc
Sally Floyd and Eddie Kohler draft-floyd-ccid4-01.txt July 2007
Who sent the Text Message? Match the Message to the Organelle
Use of EAPOL-Key messages
Sept 2003 PMK “sharing” Tim Moore Tim Moore, Microsoft.
Robert Moskowitz, Verizon
Roaming timings and PMK lifetime
IEs in 4-way handshake description
Clarification of WUR frame related to group addressed frame
Request for Legacy IE ID for RSN Extension
Presentation transcript:

Group Key Optimizations July 2003 Group Key Optimizations Tim Moore Microsoft Tim Moore, Microsoft

Allow GTK to be sent in Message 3 July 2003 Allow GTK to be sent in Message 3 Optimize number of round trips for key updates Removes key sync problem of installing Pairwise keys and sending group key update messages Removes delay in key update due to install of Pairwise key Removes sync issue in IBSS of installing Pairwise key while other STA is completing its 4-way Tim Moore, Microsoft

EAPOL-Key Use 2 reserved bytes for GTK length July 2003 EAPOL-Key Use 2 reserved bytes for GTK length Key id, RSC used for group key Secure bit set in 4-way message 3 and 4 Tim Moore, Microsoft

Change Authenticator state machine to use GTK length field July 2003 Change Authenticator state machine to use GTK length field Change STA pseudo code to check GTK length field Tim Moore, Microsoft

July 2003 Change text in 5.9.2, 5.9.3.2, 5.9.3.3 8.4.1, 8.4.8, 8.4.9 8.5.3.3, 8.5.3.5 Tim Moore, Microsoft

Motion! Insert changes described in 03/483-r0 to draft. July 2003 Tim Moore, Microsoft