Download presentation
Presentation is loading. Please wait.
Published bySara Bruce Modified over 9 years ago
1
EPON Technology Team 12/6/2015 Key Management [802.1af - considerations] 2004. 5. 12 Jee-Sook Eun Electronics and Telecommunications Research Institute
2
EPON Technology Team EPON Technology Team ( 본 발표자료는 대외비임.) 12/6/2015 Authentication Between Authentication server and Supplicant by means of EAP and EAPOL 802.1x must be supported in Access Point Back-end function for EAP packet must be supported on all devices between Access point and Authentication server. secured network Access point (Authenticator) Authentication s erver Supplicant
3
EPON Technology Team EPON Technology Team ( 본 발표자료는 대외비임.) 12/6/2015 Why we need an Authentication server? Authentication should be need Key exchange use public-key encryption Why public-key encryption? In Symmetric key encryption, the number of key distributed in network is so numerous Easy to exchange key But Authentication process is very complex and expensive Need 802.1x(authenticator, supplicant, authentication server) Need certificates for each devices, if we doesn’t generate it, we communicate with upper layer using management plane. This means that link security does not operate independently Need RSA function(Very complex Algorithm, and no verification so far)
4
EPON Technology Team EPON Technology Team ( 본 발표자료는 대외비임.) 12/6/2015 We need an Authentication server necessarily? Though we use Symmetric key encryption, the number of key distributed in network is not so numerous In network? Right But, no network. Only Two devices connected at one link need the symmetric key And Master key must install such as a certificate used in public-key encryption as off-line So, confirm of master key itself can be an authentication
5
EPON Technology Team EPON Technology Team ( 본 발표자료는 대외비임.) 12/6/2015 Authentication server is one? If there is only one authentication server in whole netw ork, all access points must have back-end function in o rder to relay EAP to authentication server If there is one device which does not support back-end function in network? In wireless LAN, mobility must be supported on device s. So, devices can be set on anywhere. But, In wired LAN, mobility may be supported on devic es. Because if one device has set, it scarcely move. Th e subscriber may move, and IP security is enough. MA C security function is not on subscriber’s device such a s PC. That is, MAC security function usually operate on switch. Switch usually does not have mobility
6
EPON Technology Team EPON Technology Team ( 본 발표자료는 대외비임.) 12/6/2015 There is multi hop to get authentication server? If there is one authentication server managing several s upplicant, it is not assure that an authenticator place wit hin one hop distance Although authentication server is in authenticator, it wou ld manage other supplicants Otherwise, why authentication server is need?
7
EPON Technology Team EPON Technology Team ( 본 발표자료는 대외비임.) 12/6/2015 Authentication server is more? If so, whenever device is changed to other access point, we must set authentication information within appropri ate authentication server. This is not different that we in stall symmetric key on new device if we use symmetric key encryption
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.