Doc.: IEEE 802.11-12/0946r3 Submission August 2012 A proposal for next generation security in 802.11 built on changes in 802.11ac 23 August 2012 Slide.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0413r0 Submission March 2009 Dan Harkins, Aruba NetworksSlide 1 A Study Group for Enhanced Security Date: Authors:
Advertisements

Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
Doc.: IEEE /0578r0 Submission 2008 May Jarkko Kneckt, NokiaSlide 1 Forwarding in mesh containing MPs in power save Date: Authors:
Lecture 7 Overview. Advanced Encryption Standard 10, 12, 14 rounds for 128, 192, 256 bit keys – Regular Rounds (9, 11, 13) – Final Round is different.
Some New RSA Mechanisms for PKCS #11 Burt Kaliski, RSA Laboratories PKCS Workshop April 14, 2003.
Doc.: IEEE /0026r0 Submission January 2011 Sameer Vermani, QualcommSlide 1 VHT Supported MCS Field Date: Authors:
Doc.: IEEE /770r0 Submission July 2009 Slide 1 TGs Authenticated Encryption Function Date: Authors: Russ Housley (Vigil Security), et.
Doc.: IEEE r1 Submission July 2011 Dan Harkins, Aruba NetworksSlide 1 Prohibiting Technology Date: Authors:
Submission doc.: IEEE 11-12/1253r1 November 2012 Dan Harkins, Aruba NetworksSlide 1 Why Use SIV for 11ai? Date: Authors:
Cryptography and Network Security Chapter 12 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 12
Cryptography and Network Security (CS435) Part Ten (Hash and MAC algorithms)
Cryptography and Network Security Chapter 12 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Doc.: IEEE /1341r0 Submission September 2011 Andrew Myles, CiscoSlide 1 JTC1 SC September Closing Report 22 Sept 2011 Authors: Meeting.
Doc.: IEEE /0580r0 Submission May 09 Myles et al (Cisco)Slide 1 Discussion on the proposal to start a new Security SG in WG.
WEP Protocol Weaknesses and Vulnerabilities
RADIUS Crypto-Agility Requirements November 18, 2008 David B. Nelson IETF 73 Minneapolis.
Hash and MAC Functions CS427 – Computer Security
Doc.: IEEE r0 Submission July 2011 Dan Harkins, Aruba NetworksSlide 1 Prohibiting Technology Date: Authors:
Hash Algorithms see similarities in the evolution of hash functions & block ciphers –increasing power of brute-force attacks –leading to evolution in algorithms.
Submission doc.: IEEE /1014r0 September 2015 Guido R. Hiertz et al., EricssonSlide 1 Multiple BSSID element Date: Authors:
Doc.: IEEE /1077r0 Submission September 2010 Dan Harkins, Aruba NetworksSlide 1 Galois/Counter Mode (GCM) Date: Authors:
Stein-65 Slide 1 PW security measures PWE3 – 65 th IETF 10 November 2005 Yaakov (J) Stein.
Doc.: IEEE /1164 r00 Submission September 2013 Paul A. Lambert, Marvell SemiconductorSlide 1 Some Par and 5C Requirements Date: Authors:
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
Submission doc.: IEEE 11-12/0553r4 May 2012 Jarkko Kneckt, NokiaSlide 1 Response Criteria of Probe Request Date: Authors:
Doc.: IEEE /0795r2 Submission July 2014 The China NB contributed a variation on the “usual comment” on IEEE China NB comment on
Doc.: IEEE e Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security.
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
1 Chapter 12: Hash and MAC Algorithms Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal, U of Kentucky)
Doc.: IEEE /0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 1 Enhanced Security Date: Authors:
11 Authentication Algorithms Discussions CCSDS Security WG Winter 2007 Colorado Springs, Colorado USA Howard Weiss NASA/JPL/SPARTA
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
Requirements and Selection Process for RADIUS Crypto-Agility December 5, 2007 David B. Nelson IETF 70 Vancouver, BC.
Doc.: IEEE /0946r1 Submission July 2012 A proposal for next generation security in built on changes in ac 16 July 2012 Slide 1 Authors:
Issue EAPoL-Key message generation at WTP or AC Issue 199, summarized as:...the WTP maintains the KeyRSC while the AC requires this information to.
Doc.: IEEE /1147r1 Submission November 2009 David Halasz, AclaraSlide 1 Path Protection Date: Authors:
RADIUS Attributes for the Delivery of Keying Material Joe Salowey Jesse Walker Tiebing Zhang Glen Zorn.
Doc.: IEEE /0452r0 Submission Mar 2016 Myles & Ecclesine, CiscoSlide 1 Recommendation on disposal of liaison from ISO/IEC JTC1/SC25/WG3 relating.
Doc.: IEEE /0099r2 Submission Jan 2013 A resolution proposal comments related to for next generation security in built on changes in ac.
Doc.: IEEE /465r0 Submission Wim Diepstraten, Agere Systems July 2002 Slide 1 WiSP Wireless Sidelink Protocol Wim Diepstraten Gerrit Hiddink Agere.
Enhanced Security Date: Authors: May 2009 May 2009
Enhanced Security Features for
July 2010 doc.: IEEE /0903r0 A resolution proposal comments related to for next generation security in built on changes in ac 14.
IEEE 802 EC July Motions Date: Authors: Name
Enhanced Security Features for
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG SECN PAR & CSD Comment resolution March.
Directed Multicast Service (DMS)
<month year> doc.: IEEE < e> <May 2018>
Key Descriptor Version in EAPOL Key Frames
IEEE 802 JTC1 Standing Committee May 2018 (Warsaw) closing report
<month year> doc.: IEEE < e> <May 2018>
Multi-band Discovery Assistance for ay (CR on CID 1771)
July 2010 doc.: IEEE /0903r0 A proposal for next generation security in built on changes in ac 23 August 2012 Authors: Name Company.
December 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security considerations for 15.3e] Date.
CR for CID 1105 Date: Authors: January 2019 Month Year
Directed Multicast Service (DMS)
Multi-band Discovery Assistance for ay (CR on CID 1771)
doc.: IEEE /454r0 Bob Beach Symbol Technologies
GCMP Restriction Date: Authors: January 2011 May 2010
CID#89-Directed Multicast Service (DMS)
Straw Polls and Motions on 256 QAM and BW: Optional-Mandatory Features
Channelization for China’s Spectrum
Directed Multicast Service (DMS)
July 2010 doc.: IEEE /0903r0 A resolution proposal comments related to for next generation security in built on changes in ac 14.
draft-ietf-dtn-bpsec-06
TGu/TGv Joint Meeting Date: Authors: May 2008 Month Year
Presentation transcript:

doc.: IEEE /0946r3 Submission August 2012 A proposal for next generation security in built on changes in ac 23 August 2012 Slide 1 Authors: NameCompanyPhone Joe SaloweyCisco Stephen OrrCisco Brian HartCisco Andrew MylesCisco Dan HarkinsAruba dharkins at arubanetworks dot com Salowey et al (Cisco), Harkins (Aruba)

doc.: IEEE /0946r3 Submission August 2012 LB188 contains comments requesting the inclusion of updated security options in ac Comment Proposed change 11ac does not seem to have a sufficiently rich set of security options to meet Suite-B requirements Define a sufficient security toolkit for 11ac so that 11ac can meet Suite B requirements, including any transitional measures if required Number 6198 from Brian Hart (Cisco) Salowey et al (Cisco), Harkins (Aruba) Add support for GCM-256 and Suite B Adopt the changes specified in document 11-12/0711rX, where X is any revision (currently at zero) 6513 from Dan Harkins (Aruba) Now at r1

doc.: IEEE /0946r3 Submission August 2012 It is proposed that TGac consider inclusion of next generation security features in ac in Sept Slide 3 Security mechanisms are evolving due to advances in computing & cryptographic science is missing next generation security mechanisms that will be required in the near future ac should include new mechanisms that support next generation requirements The inclusion of features like AES-GCMP will align ac with mechanisms used by other standards The integrity of & interoperability will be threatened unless the work is undertaken by Two suites of mechanisms -A set of mechanisms to expedite delivery of strong security to the industry (important for transition) -A set of mechanisms to align with NSA suite B The proposed path for approval is discussion until September and consideration for inclusion into D4.0 at the Palm Springs meeting Salowey et al (Cisco), Harkins (Aruba)

doc.: IEEE /0946r3 Submission August 2012 Security mechanisms are evolving due to advances in computing & cryptographic science Security mechanisms are not static – they evolve over time due to advances in computing and cryptographic science –e.g. DES was deprecated and replaced by AES –e.g. SHA-1 will be disallowed by NIST after 2013, MD5 already is disallowed The “Suite B” profile defined by the USG NSA defines a consistent set of cryptographic algorithms to provide one of two levels of security –128-bit: SHA256 for hashing, P256 for key derivation, AES-128 for encryption –192-bit: SHA384 for hashing, P384 for key derivation, AES-256 for encryption Similar profiles are likely be demanded by non-governmental and governmental organizations in the near future –Governments, e.g. US, Canadian and other governments are all known to want a higher bar –Security orgs, e.g. NATO, military –Industry orgs, e.g. financial services & health Slide 4 Salowey et al (Cisco), Harkins (Aruba)

doc.: IEEE /0946r3 Submission August 2012 The inclusion of next generation security will align ac with mechanisms used by other standards Slide 5 TLS IPSEC Standard AES-CBC-256, AES-CBC-128 (RFC 5246) AES-GCM-256, AES-GCM-128 (RFC 5288) AES-CBC-256, AES-CBC-128 (RFC 3602) AES-GCM-256, AES-GCM-128 (RFC 4106) Algorithms IEEE 802.1AEAES-GCM-256, AES-GCM-128 Salowey et al (Cisco), Harkins (Aruba)

doc.: IEEE /0946r3 Submission August ac should include new mechanisms that support next generation security requirements Slide 6 Encryption Algorithm Set AES-256-CCMP Transition MACAES-256-CMAC Hash for PRFSHA384 AES-256-GCMP Suite B alignment AES-256-GMAC SHA384 Salowey et al (Cisco), Harkins (Aruba) AES-128-CCMP IEEE AES-128-CMAC SHA256 Same mode as Can be enabled on some existing hardware. Next Generation Security for Industry There are efficiency arguments for GCMP at the highest ac rates

doc.: IEEE /0946r3 Submission August 2012 A transition to next generation requirements should support improved security on older hardware Not all hardware in existing APs or clients (802.11a/b/g/n) can support new cipher mode (GCM) requirements … … and yet there is a desire to support next generation security in even these devices It is known that some existing hardware can support AES-CCMP-256, and the standard should take advantage of this as part of a transition path Slide 7 Salowey et al (Cisco), Harkins (Aruba)

doc.: IEEE /0946r3 Submission August 2012 The integrity of & interoperability will be threatened unless the work is done by The WG could decide to not undertake this work The “world will not end” because i based security will still be sufficient for many use cases However, increasingly it will not be sufficient in some use cases. In these situations there is a risk, if next generation security features are not included in ac, that: –Other organisations will attempt to define variants of the standard to meet this need … … threating the integrity of the standard –Some companies will define proprietary solutions … … threatening the on-going interoperability of based systems Slide 8 Salowey et al (Cisco), Harkins (Aruba)

doc.: IEEE /0946r3 Submission August 2012 The proposed path forward is discussion until Sept & consideration for inclusion into D4.0 in Palm Springs Slide 9 D3.0 LB Brian Hart comments San Diego Socialisation of proposal Teleconferences Discussion Palm Springs Motion on inclusion We are here Overview of draft changes in r0 & r1 A slot convenient for all interested security folk for discussion Salowey et al (Cisco), Harkins (Aruba) Revise draft based on community input for inclusion in ac

doc.: IEEE /0946r3 Submission August 2012 Q&A A BSS advertises the “Advanced Security” suite but my client HW doesn’t support this suite. What happens? –This capability is enabled by IT departments with stringent security requirements, so the only devices that support the advanced security capabilities would gain access to the BSS. –The AP’s physical box may advertise multiple BSSs with different levels of security and access. Your client HW would still have access to a lower security (perhaps guest) SSID for instance. Why doesn’t 11-12/0711r1 include support for 11r? –This is under discussion Slide 10 Salowey et al (Cisco), Harkins (Aruba)