Download presentation
Presentation is loading. Please wait.
Published byEdward Hall Modified over 8 years ago
1
RADIUS Attributes for the Delivery of Keying Material Joe Salowey Jesse Walker Tiebing Zhang Glen Zorn
2
Goals Securely transfer crypto keying material between RADIUS servers & client –Crypto-agility –NIST validation RADIUS as part of IEEE 802.1X & 802.11i systems Provide strong authentication for any RADIUS message –Crypto-agility –Accounting –Dynamic Authorization
3
Attributes Keying-Material –8-bit encryption type –16-bit application ID & key lifetime –128-bit KEK & Key IDs –Variable-length IV & keying material MAC-Randomizer –256-bit pseudo-random number –Substitute for Authenticator in CoA, etc. Message-Authentication-Code –Crypto-agile MAC
4
Rationale Extends existing RADIUS framework Attributes re-usable in various situations –Different keying methods IEEE 802.11i IEEE 802.1af WiMAX HOKEY (?) –Dynamic messages (e.g. CoA) –Accounting
5
Features No key management scheme specified –KEK, MAC Key “magically” provisioned –No reliance on particular derivation or provisioning methods –KEK-ID facilitates external key management schemes Application ID identifies key usage Crypto-agility supported –Encryption & MAC algorithms replaceable
6
Summary Provides crypto-agility for message authentication –Useful for CoA, accounting Provides crypto-agility for common key encryption attribute –Useful to carry MSK & other EAP-derived keys Efficient –Only necessary attributes encrypted
7
Next Steps Adopt as WG item –Draft in rev 12 Extensively reviewed Approach vetted by NIST –Multiple interoperable implementations Cisco 3eTI
8
Discussion?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.