1 / 4

EMSK Usage Guidelines (EAP key derivation for multiple applications)

EMSK Usage Guidelines (EAP key derivation for multiple applications). draft-salowey-eap-key-deriv-02.txt J. Salowey P. Eronen IETF 58. EMSK. 2284bis defines and reserves EMSK. Several applications have been suggested for it draft-ietf-eap-keying-01.txt draft-irtf-aaaarch-handoff-04.txt

rufin
Download Presentation

EMSK Usage Guidelines (EAP key derivation for multiple applications)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. EMSK Usage Guidelines(EAP key derivation for multiple applications) draft-salowey-eap-key-deriv-02.txt J. Salowey P. Eronen IETF 58

  2. EMSK • 2284bis defines and reserves EMSK. • Several applications have been suggested for it • draft-ietf-eap-keying-01.txt • draft-irtf-aaaarch-handoff-04.txt • draft-salowey-eap-protectedtlv-01.txt • Others

  3. Key Framework Draft • Usage guidelines for the EMS need to be established • Key Naming needs to be fleshed out (deriving names directly from keys may not be such a good idea) • Examples of EMSK usage should promote usage of the EMSK such that computationally independent keys can be derived for several applications (i.e. the guideline draft)

  4. Next Step • Incorporate the EMSK Guideline draft into the key framework draft or reference it.

More Related