Download presentation
Presentation is loading. Please wait.
Published byMarianna Allison Modified over 6 years ago
1
Extending EAP Keying Vidya Narayanan Lakshminath Dondeti
2
Preface Philosophical question – is this even needed?
Why this presentation? Concerns over some of the proposed key hierarchies associated with previous versions of the charter Felt a need to summarize previous work and rules/guidelines to follow and present the bigger picture Needless to say, these are our individual opinions!!
3
Motivation for our work
Possible areas of investigation for EAP keying usage Handoffs Pre-authentication Localized re-authentication Pro-active keying Bootstrapping legacy PSK-based applications Extensibility for future uses
4
Problem Statement Allowable uses for EAP keying material
Can’t anticipate all use cases Prevent one application of EAP keying from imposing constraints on others Avoid key re-use Consistent key naming Simple framework that allows independent key derivation Key compromise in one application must not impact other applications
5
Areas of Work Coordinated derivation of keys from EMSK Key hierarchy
Key naming Key derivation Key distribution Key scoping Key lifetimes and expiration Applications of derived keys
6
EAP Keying Hierarchy Long Term Credential MSK EMSK … TSK AMSK1 AMSKn
7
Next Steps EAP Keying Gap Analysis EMSK Usage Guidelines
MSK usage clearly defined EMSK usage not defined EMSK Usage Guidelines Key hierarchy Key naming Key derivation AMSK Usage Guidelines Key distribution Key scoping Key lifetimes and expiration
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.