Doc.: IEEE 802.11-11-0964r0 Submission July 2011 Dan Harkins, Aruba NetworksSlide 1 Prohibiting Technology Date: 2011-07-15 Authors:

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0413r0 Submission March 2009 Dan Harkins, Aruba NetworksSlide 1 A Study Group for Enhanced Security Date: Authors:
Advertisements

Doc.: IEEE /1263r0 Submission November 2008 Dan Harkins, Aruba NetworksSlide 1 A Modest Proposal…. Date: Authors:
Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
Doc.: IEEE /0836r2 Submission July 2008 Dan Harkins, Aruba NetworksSlide 1 Changes to SAE State Machine Date: Authors:
Submission doc.: IEEE 11-13/0487r0 May 2013 Dan Harkins, Aruba NetworksSlide 1 How To Fragment An IE Date: Authors:
Doc.: IEEE /0283r0 Submission March 2009 Dan Harkins, Aruba NetworksSlide 1 Suggested Changes to the Abbreviated Handshake Date: Authors:
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
PROPRIETARY PROCUREMENTS David D. Duncan Deputy General Counsel Texas Comptroller of Public Accounts.
Doc.: IEEE /770r0 Submission July 2009 Slide 1 TGs Authenticated Encryption Function Date: Authors: Russ Housley (Vigil Security), et.
Doc.: IEEE r1 Submission July 2011 Dan Harkins, Aruba NetworksSlide 1 Prohibiting Technology Date: Authors:
Submission doc.: IEEE 11-12/1253r1 November 2012 Dan Harkins, Aruba NetworksSlide 1 Why Use SIV for 11ai? Date: Authors:
Doc.: IEEE /0494r0 Agenda May 2015 Dorothy Stanley, Aruba NetworksSlide 1 IEEE TGmc May 2015 Agenda Date: Authors:
Statutory Analysis Analyzing Statutory Authority Techniques of Interpretation.
Doc.: IEEE /0946r3 Submission August 2012 A proposal for next generation security in built on changes in ac 23 August 2012 Slide.
1 May 2007 Instructions for the WG Chair The IEEE-SA strongly recommends that at each WG meeting the chair or a designee: l Show slides #1 through #5 of.
Doc.: IEEE / wng Submission March 2007 Takeshi Nakamura, Trinity Security Systems, Inc.Slide 1 IPN-WLAN: ‘IPN’ enabled Wireless LANs A.
Submission doc.: IEEE /1326r0 Extend Submission Panasonic Nov 2012 PSDU Size For Receiver Sensitivity Power Level Date: Authors:
Doc.: IEEE /2032r0 Submission July 2007 Stephen McCann, Nokia Siemens NetworksSlide 1 IEEE 802 ES Ad Hoc Notice: This document has been prepared.
Doc.: IEEE /0422r5 Submission April 2009 Matthew Gast, Trapeze NetworksSlide 1 TGmb Teleconferences March 2009 through May 2009 Date:
WEP Protocol Weaknesses and Vulnerabilities
Doc.: IEEE /0374r0 Submission March 2010 Dan Harkins, Aruba NetworksSlide 1 Clarifying the Behavior of PMK Caching Date: Authors:
Submission doc.: IEEE 11-14/0062r0 January 2014 Dan Harkins, Aruba NetworksSlide 1 PMK Caching for FILS Date: Authors:
Doc.: IEEE /1224r1 Submission September 2008 Jesse Walker, Intel CorporationSlide 1 IEEE TGw October Agenda Date: Authors:
Doc.: IEEE /1001r0 Submission Sept 2012 Jon Rosdahl (CSR)Slide 1 Sept 1 st Vice Chair Report Date: Authors:
Doc.: IEEE /684r0 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 1 Extended Keymap ID Martin Lefkowitz Trapeze Networks.
Doc.: IEEE b Submission November 2004 Robert Poor, Ember CorporationSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /1077r0 Submission September 2010 Dan Harkins, Aruba NetworksSlide 1 Galois/Counter Mode (GCM) Date: Authors:
Doc.: IEEE /0123r0 Submission January 2009 Dan Harkins, Aruba NetworksSlide 1 Secure Authentication Using Only A Password Date:
Doc.: r0-I Submission July 22, 2003 Paul Lambert, Airgo NetworksSlide 1 Removing the TKIP Specific Backdoor from the CCMP Mode of Encryption.
Doc.: IEEE e Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security.
Doc.: IEEE /0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 1 Enhanced Security Date: Authors:
Doc.: IEEE /211r0-Michael-Attacks-And-Countermeasures Submission March 2003 Dan Harkins, Trapeze Networks.Slide 1 Attacks against Michael and.
Doc.: IEEE /0075r0 Report Nov 2011 Jon Rosdahl, CSRSlide 1 First Vice Chair Report 2011 Date: Authors:
Doc.: IEEE /0001r00 Agenda January 2016 Jay Holcomb, Itron Inc. IEEE RR-TAG Teleconference Agenda Date: 11 January 2016 Authors:
Doc.: IEEE /0848-r2 Submission July 2006 K.HayesSlide 1 RSC Pools for Mgmt Frames Notice: This document has been prepared to assist IEEE
Doc.: IEEE /0747r0 Submission May 2006 Lee Armstrong, Armstrong Consulting, Inc.Slide 1 TGp May Opening Presentation Notice: This document has.
Doc.: IEEE /0422r0 Submission March 2009 Matthew Gast, Trapeze NetworksSlide 1 TGmb Teleconferences March 2009 through May 2009 Date:
Should NIST Develop an Additional Version of GCM? July 26, 2007 Morris Dworkin, Mathematician Security Technology Group
Doc.: IEEE /0946r1 Submission July 2012 A proposal for next generation security in built on changes in ac 16 July 2012 Slide 1 Authors:
Doc.: IEEE /1537r0 Submission November 2011 Mark Hamilton, Polycom, Inc.Slide 1 ARC-agenda-minutes-november-2011 Date: Authors:
Doc.: IEEE /0964r0 Submission September 2010 David Halasz, AclaraSlide 1 Smart Grid and Key Lengths Date: Authors:
Doc.: IEEE /1147r1 Submission November 2009 David Halasz, AclaraSlide 1 Path Protection Date: Authors:
Doc.: IEEE /XXXXr0 Submission July 2006 Nancy Cam-Winget, Cisco Slide 1 Constructing unique key streams for Management Frame Protection Notice:
Doc.: IEEE /0899r2 Submission July2010 Dan Harkins, Aruba NetworksSlide 1 Secure PSK Authentication Date: Authors:
Doc.: IEEE /0099r2 Submission Jan 2013 A resolution proposal comments related to for next generation security in built on changes in ac.
Enhanced Security Date: Authors: May 2009 May 2009
Secure PSK Authentication
Authentication and Upper-Layer Messaging
Wireless Protocols WEP, WPA & WPA2.
Response to Official Comments
Enhanced Security Features for
July 2010 doc.: IEEE /0903r0 A resolution proposal comments related to for next generation security in built on changes in ac 14.
Enhanced Security Features for
Secure PSK Authentication
Towards an Improved Proposal Development Process for VHT
Key Descriptor Version in EAPOL Key Frames
December 2, 2018 doc.: IEEE r0 May, 2004
TGv redline between Draft 1.0 and 1.01
July 2010 doc.: IEEE /0903r0 A proposal for next generation security in built on changes in ac 23 August 2012 Authors: Name Company.
January 16, 2019 doc.: IEEE r0 September, 2004
December 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security considerations for 15.3e] Date.
Changes to SAE State Machine
GCMP Restriction Date: Authors: January 2011 May 2010
Light Communications Study Group teleconference February 2018 Agenda
TKIP in w Date: Authors: September 2005 Month Year
Clause 7 Comment Resolutions
TGi Preliminary Agenda
July 2010 doc.: IEEE /0903r0 A resolution proposal comments related to for next generation security in built on changes in ac 14.
Response to Official Comments
Presentation transcript:

doc.: IEEE r0 Submission July 2011 Dan Harkins, Aruba NetworksSlide 1 Prohibiting Technology Date: Authors:

doc.: IEEE r0 Submission July 2011 Dan Harkins, Aruba NetworksSlide 2 Abstract Draft P802.11ac_1.0 forbids the use of TKIP and GCMP. This is problematic.

doc.: IEEE r0 Submission IEEE Anti-Trust Policies “Other kinds of violations can also arise in the standards process. For example, selecting one technology for inclusion in a standard is lawful, but an agreement to prohibit standards participants (or implementers) from implementing a competing standard or rival technology would be unlawful – although as a practical matter, a successful standard may lawfully achieve this result through the workings of the market.” (emphasis mine) Draft P802.11ac_D1.0 prohibits both TKIP and GCMP. –A protest was made over the exclusion of GCMP based on the policies of IEEE regarding unlawful anti-trust activity. July 2011 Dan Harkins, Aruba NetworksSlide 3

doc.: IEEE r0 Submission July 2011 Dan Harkins, Aruba NetworksSlide 4 Document 11-11/0896r0– status of protest The opinion of IEEE legal counsel (emphasis mine): –A standard can certainly prescribe a minimum functionality or feature set. A standard can also prohibit features that significantly interfere with the functionality or security of a prescribed feature. –But if an additional function or feature does not significantly interfere with the performance of the minimum feature, then it is difficult to justify a standard's excluding that functionality. –If there is a technical basis for the contemplated exclusion, then a discussion of that claimed basis should take place within the working group. If there was no intention to exclude a technology (but simply make clear that the standard does not require that technology), then the phrasing as written does not clearly accomplish the goal, and it should be rewritten.

doc.: IEEE r0 Submission July 2011 Dan Harkins, Aruba NetworksSlide 5 Do They Significantly interfere with the Functionality or Security of 11ac? TKIP – yes, it interferes with security –The security assurance of its authentication component (Michael) is too weak for VHT– vs for CCMP. –RC4 (cipher used in TKIP) has known vulnerabilities. TKIP attempts to address them but no security proof exists. CCMP has a security proof. GCMP– no, its functionality and security is superior to CCMP –The security assurance of its authentication component (GHASH) is better than ’s instantiation of CCMP– GCMP has a 128-bit tag, CCMP has a truncated 64-bit tag. –GCMP performs authenticated encryption in one pass, CCMP uses two. –Implementations of GCMP can be faster than CCMP in both hardware (no stalls in AES pipeline) and in software (especially with the single “carryless multiplication” instruction). –GCMP has a security proof.

doc.: IEEE r0 Submission Conclusion There is a valid technical reason to exclude TKIP. Whether it needs to be expressly spelled out in the draft is an open question– TKIP is already deprecated in , does its exclusion need to be mentioned again? There is no valid technical reason to exclude GCMP. –GCMP does not interfere with the functionality or security of VHT –GCMP is actually a superior cipher to CCMP. Based upon some VHT data rates, and considering that some implementations may be in software, a strong case can be made to expressly include GCMP as a valid cipher in 11ac. July 2011 Dan Harkins, Aruba NetworksSlide 6

doc.: IEEE r0 Submission July 2011 Dan Harkins, Aruba NetworksSlide 7 References p802-11ac-draft-language-protest D. McGrew and J. Viega-- The Security and Performance of the Galois/Counter Mode (GCM) of Operation. INDOCRYPT 2004, LNCS vol 3348, Springer, pp , Presentation by Morris Dworkin (NIST) to SAAG at 69 th IETF meeting, July 26 th,