[go: up one dir, main page]

Clancy et al., 2009 - Google Patents

Extensible Authentication Protocol-Generalized Pre-Shared Key (EAP-GPSK) Method

Clancy et al., 2009

View HTML
Document ID
7582572230708561295
Author
Clancy T
Tschofenig H
Publication year

External Links

Snippet

RFC 5433: Extensible Authentication Protocol - Generalized Pre-Shared Key (EAP-GPSK) Method [RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] PROPOSED STANDARD Network Working Group T. Clancy Request for Comments: 5433 LTS Category: Standards Track …
Continue reading at www.rfc-editor.org (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Similar Documents

Publication Publication Date Title
Bersani et al. The EAP-PSK protocol: A pre-shared key extensible authentication protocol (EAP) method
Arkko et al. Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA)
AlFardan et al. On the security of RC4 in TLS and WPA
US8195932B2 (en) Authentication and encryption for secure data transmission
Lashkari et al. Wired equivalent privacy (WEP) versus Wi-Fi protected access (WPA)
Clancy et al. Extensible Authentication Protocol-Generalized Pre-Shared Key (EAP-GPSK) Method
US20120284524A1 (en) Low overhead nonce construction for message security
Tschofenig et al. The extensible authentication protocol-Internet key exchange protocol version 2 (EAP-IKEv2) method
Brown 802.11: the security differences between b and i
Borsc et al. Wireless security & privacy
Gupta Cryptography and network security
Arkko et al. RFC 4187: Extensible authentication protocol method for 3rd generation authentication and key agreement (eap-aka)
Sheffer et al. An EAP authentication method based on the encrypted key exchange (EKE) protocol
Vanderveen et al. Extensible Authentication protocol method for shared-secret authentication and key establishment (EAP-SAKE)
Xiao et al. Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
Clancy et al. Extensible authentication protocol (EAP) password authenticated exchange
Hoeper et al. Recommendation for EAP Methods Used in Wireless Network Access Authentication
Clancy et al. RFC 5433: Extensible Authentication Protocol-Generalized Pre-Shared Key (EAP-GPSK) Method
Key EMU Working Group T. Clancy Internet-Draft LTS Intended status: Standards Track H. Tschofenig Expires: January 7, 2008 Nokia Siemens Networks July 6, 2007
Kuegler et al. Password authenticated connection establishment with the internet key exchange protocol version 2 (ikev2)
Thuc et al. A Sofware Solution for Defending Against Man-in-the-Middle Attacks on Wlan
Key EMU Working Group T. Clancy Internet-Draft LTS Intended status: Standards Track H. Tschofenig Expires: August 10, 2007 Siemens Networks GmbH & Co KG February 6, 2007
Bersani et al. RFC 4764: The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method
Key EMU Working Group T. Clancy Internet-Draft LTS Expires: December 28, 2006 H. Tschofenig Siemens June 26, 2006
Pervaiz et al. Security in wireless local area networks