Doc.: IEEE 802.11-01/296r1 SubmissionMitch Buchman May 2001 Slide 1 TGi Draft 1Clause 8.2-8.2.2 Comments IEEE P802.11E Security/D1.0 Letter Ballot# 25.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /147March 2000 TGe SecuritySlide 1 The Status of TGe S Draft Text Jesse Walker Intel Corporation (503)
Advertisements

1 September 2003 IEEE Draft 2.5 OAM Comment Resolution Las Vegas, NV - September 2003 Section Editor: Glenn Parsons Technical Editors: Leon Bruckman,
Doc.: IEEE /770r0 Submission July 2009 Slide 1 TGs Authenticated Encryption Function Date: Authors: Russ Housley (Vigil Security), et.
Doc.: IEEE /037 Submission March 2000 Duncan Kitchin, Jesse Walker, Intel NIDSlide 1 Proposal for Enhanced Encryption Duncan Kitchin Jesse Walker.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
Submission doc.: IEEE IEEE q - Conditional Approval to Start Sponsor Ballot Slide 1Bob Heile, Wi-SUN Alliance June 2015.
Bob SultanMay 9, 2002IEEE RPRWG IEEE Resilient Packet Ring Draft D0.2 Section 1 Comment Resolution May, 2002 Ottawa, Canada
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Wireless Networking.
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
Copyright 2007, Paradigm Publishing Inc. ACCESS 2007 Chapter 3 BACKNEXTEND 3-1 LINKS TO OBJECTIVES Modify a Table – Add, Delete, Move Fields Modify a Table.
Doc.: IEEE /1206r0 Submission Oct 2004 Black, NokiaSlide 1 TGk LB71 Parallel category comment resolution Simon Black (Nokia)
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Doc.: r0-I Submission July 22, 2003 Paul Lambert, Airgo NetworksSlide 1 Removing the TKIP Specific Backdoor from the CCMP Mode of Encryption.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Doc.: IEEE Submission Oct Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
Doc.: IEEE /230 Submission May 2001 William Arbaugh, University of MarylandSlide 1 An Inductive Chosen Plaintext Attack against WEP/WEP2 William.
Doc.: IEEE c Submission Slide 1 July, 2008 Chang woo Pyo, NICT Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE Submission Oct Slide 1 Sangjae Lee (ETRI) et al Project: IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Additional Comments.
Doc.: IEEE /XXXXr0 Submission July 2006 Nancy Cam-Winget, Cisco Slide 1 Constructing unique key streams for Management Frame Protection Notice:
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Doc.: IEEE /034r0 Submission January 2002 Matthew B. Shoemake, TGg ChairpersonSlide 1 TGg Report to the IEEE Working Group Matthew B. Shoemake.
Closing Report Date: Authors: November 2008 September 2008
doc.: IEEE g-Trends-in-SUN-capacity
Motions to Address Some Letter Ballot 52 Comments
IEEE i Dohwan Kim.
doc.: IEEE <doc#>
doc.: IEEE <doc#>
Corrections for D2.8 Date: Authors: May 2014 Name
doc.: IEEE <doc#>
LB84 Submission: Updated LDPC Encoding Figure to Resolve CID #940
Summary of Unresolved General Comments for 2/14 TGs Telecon
March 2013 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Comment Resolution Suggestions Date Submitted:
An Inductive Chosen Plaintext Attack against WEP/WEP2
Element for Legacy Indication
doc.: IEEE <doc#>
November 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG SECN Amendment text] Date Submitted:
FEC Capability and Control
doc.: IEEE g-Trends-in-SUN-capacity
doc.: IEEE g-Trends-in-SUN-capacity
Overview of Changes to Key Holder Frame Formats
TGi Preliminary Agenda
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TG4m Draft PHY Feedback (TBD’s,
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
May 2002 doc.: IEEE /299R0 May 2002 Slides to Assist with non-19 Comments (based on R1 Comment Resolution Excel Sheet) Terry Cole AMD.
Clarifying TKIP MIC processing format Fred Stivers, Texas Instruments
IEEE MEDIA INDEPENDENT HANDOVER DCN:
doc.: IEEE g-Trends-in-SUN-capacity
November 2010 doc.: IEEE /0800r9 November 2010
doc.: IEEE g-Trends-in-SUN-capacity
November 2008 doc.: IEEE /1437r1 November 2010
March 2013 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Comment Resolution Suggestions Date Submitted:
doc.: IEEE <doc#>
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Comments for Nov 2010 EC PAR proposals.
LB84 Submission: Updated LDPC Encoding Figure to Resolve CID #940
TGi Draft 1 Clause – 8.5 Comments
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
TGi Draft 1 Clause – 8.5 Comments
WPA Coordination Changes
doc.: IEEE g-Trends-in-SUN-capacity
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Presentation transcript:

doc.: IEEE /296r1 SubmissionMitch Buchman May 2001 Slide 1 TGi Draft 1Clause Comments IEEE P802.11E Security/D1.0 Letter Ballot# 25

doc.: IEEE /296r1 SubmissionMitch Buchman May 2001 Slide 2 Summary of Comments Total Comments79 Editorial –Minor30 –Major1 Technical –Minor4 –Serious4 Clarification Required1 Repeated39

doc.: IEEE /296r1 SubmissionMitch Buchman May 2001 Slide – Insert word “the” 375 – Replace “this” with “these” 1290 – Replace “new” with “additional” 376 – Replace “it” with “if” 377 – Replace "equipement" with "equipment" 65 – Spell out abbreviation of init to initialization Editorial - Minor (by Comment ID) All of the following have been confirmed as minor editorial comments and valid: 65, 67, 374, 375, 376, 377, 379, 380, 381, 382, 383, 385, 386, 608, 757, 1232, 1290, 1292, 1296, 1344, 1365, 1366, 1370, 1433, 1488, 1489, 1561, 1603, 1753, 1754

doc.: IEEE /296r1 SubmissionMitch Buchman May 2001 Slide 4 Editorial – Minor (by Comment ID) 379 – Replace use of word “obtains” 380 – Clarify support for WEP and WEP2 608 – Fix graphics arrows 757 – Remove unnecessary sentence 1296 – Clarify use of word “unique” 1366 – Repair graphics lines and arrows 1344 – Correct figure numbering 385 – Insert word “in” 386 – Insert clause reference (clause xxx)

doc.: IEEE /296r1 SubmissionMitch Buchman May 2001 Slide 5 Editorial – Minor (by Comment ID) 1365 – Insert ref re ICV in WEP2 to WEP Basic 1433 – Clarify portion of frame that is encrypted 67 – Make byte count in figure consistent w/ text 1292 – Remove opinions 1370 – Add example of key ID fields 1488 – Correct number of fields identified 1489 – Clarify IV field name reference 1754 – Remove word “catastrophically” 1561 – Minimize repetition in WEP/WEP2 description

doc.: IEEE /296r1 SubmissionMitch Buchman May 2001 Slide 6 Editorial – Minor (by Comment ID) 1603 – Insert phrase “better privacy” re WEP2 381 – Delete duplicate word “with” 382 – Insert word “be” 383 – Correct figure reference 1753 – Add reference for “Vernam” cipher Add examples for Basic WEP, WEP2, AES, and PMAC

doc.: IEEE /296r1 SubmissionMitch Buchman May 2001 Slide 7 Editorial – Major (by Comment ID) 1484 – Change section title from “data encapsulation” with “cipher suites” The following has been identified as major editorial comment and warrants group discussion prior to approval: 1484

doc.: IEEE /296r1 SubmissionMitch Buchman May 2001 Slide 8 Technical - Minor (by Comment ID) 64 – Insert warning against Basic WEP use 93 – Define a Message Integrity Check for WEP – Define Key Extension/Truncation bit order 1445 – Clarify PDU minimum length inconsistency The following have been identified as minor technical comment and warrant group discussion prior to approval: 64, 93, 1295, 1445

doc.: IEEE /296r1 SubmissionMitch Buchman May 2001 Slide 9 Technical - Major (by Comment ID) 66 – Clarify or remove use of Key ID / Pad in IV 590 – Add replay protection using IV 1368 – Change location of encryption algorithm indicator 1756 – AP knowledge of Cipher Suite The following have been identified as major technical comment and warrants group discussion prior to approval: 66, 590, 1368, 1756

doc.: IEEE /296r1 SubmissionMitch Buchman May 2001 Slide 10 Clarification Required (by Comment ID) 759 – MIB Undecryptable Counter The following has been identified as a comment which requires further clarification by the submitter: 759