Download presentation
Presentation is loading. Please wait.
Published byCarol Higgins Modified over 8 years ago
1
doc.: IEEE 802.11-11/12-0378-00-0wng Submission March 2012 Paul A. Lambert (Marvell)Slide 1 Key Centric Identity Date: 12-03-12 Authors:
2
doc.: IEEE 802.11-11/12-0378-00-0wng Submission Public Key Based Authentication November 2011 Clint Chaplin, Chair (Samsung)Slide 2 Private Key Public Key Public Keys can be openly shared Key pairs are used in an authentication exchange that proves that an entity “holds” a particular public key K 1 K 2
3
doc.: IEEE 802.11-11/12-0378-00-0wng Submission Identity Public keys are the primary authentication mechanism Why not use public keys as a primary identity? –Most identifiers require central coordination (like MAC address, DNS names, etc) –Public keys are large numbers that are by definition unique March 2012 Clint Chaplin, Chair (Samsung)Slide 3
4
doc.: IEEE 802.11-11/12-0378-00-0wng Submission Access Control with Public Keys as Identity November 2011 Clint Chaplin, Chair (Samsung)Slide 4 Can K 1 enter network? K 1 K 2 Access control servers do NOT need to hold any secrets
5
doc.: IEEE 802.11-11/12-0378-00-0wng Submission Hashing Public Keys Public keys can be large Hashing can be used to create a smaller and still unique identifier March 2012 Clint Chaplin, Chair (Samsung)Slide 5
6
doc.: IEEE 802.11-11/12-0378-00-0wng Submission Hashing Keys to Form Addresses Public keys can even be used as an address using a hash March 2012 Clint Chaplin, Chair (Samsung)Slide 6 46 bits of hash(K 1, Ni)
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.