Clancy et al., 2009 - Google Patents
Extensible Authentication Protocol-Generalized Pre-Shared Key (EAP-GPSK) MethodClancy et al., 2009
View HTML- Document ID
- 7582572230708561295
- Author
- Clancy T
- Tschofenig H
- Publication year
External Links
Snippet
RFC 5433: Extensible Authentication Protocol - Generalized Pre-Shared Key (EAP-GPSK)
Method [RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] PROPOSED STANDARD
Network Working Group T. Clancy Request for Comments: 5433 LTS Category: Standards Track …
- 238000009795 derivation 0 description 25
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bersani et al. | The EAP-PSK protocol: A pre-shared key extensible authentication protocol (EAP) method | |
Arkko et al. | Extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA) | |
AlFardan et al. | On the security of RC4 in TLS and WPA | |
US8195932B2 (en) | Authentication and encryption for secure data transmission | |
Lashkari et al. | Wired equivalent privacy (WEP) versus Wi-Fi protected access (WPA) | |
Clancy et al. | Extensible Authentication Protocol-Generalized Pre-Shared Key (EAP-GPSK) Method | |
US20120284524A1 (en) | Low overhead nonce construction for message security | |
Tschofenig et al. | The extensible authentication protocol-Internet key exchange protocol version 2 (EAP-IKEv2) method | |
Brown | 802.11: the security differences between b and i | |
Borsc et al. | Wireless security & privacy | |
Gupta | Cryptography and network security | |
Arkko et al. | RFC 4187: Extensible authentication protocol method for 3rd generation authentication and key agreement (eap-aka) | |
Sheffer et al. | An EAP authentication method based on the encrypted key exchange (EKE) protocol | |
Vanderveen et al. | Extensible Authentication protocol method for shared-secret authentication and key establishment (EAP-SAKE) | |
Xiao et al. | Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs | |
Clancy et al. | Extensible authentication protocol (EAP) password authenticated exchange | |
Hoeper et al. | Recommendation for EAP Methods Used in Wireless Network Access Authentication | |
Clancy et al. | RFC 5433: Extensible Authentication Protocol-Generalized Pre-Shared Key (EAP-GPSK) Method | |
Key | EMU Working Group T. Clancy Internet-Draft LTS Intended status: Standards Track H. Tschofenig Expires: January 7, 2008 Nokia Siemens Networks July 6, 2007 | |
Kuegler et al. | Password authenticated connection establishment with the internet key exchange protocol version 2 (ikev2) | |
Thuc et al. | A Sofware Solution for Defending Against Man-in-the-Middle Attacks on Wlan | |
Key | EMU Working Group T. Clancy Internet-Draft LTS Intended status: Standards Track H. Tschofenig Expires: August 10, 2007 Siemens Networks GmbH & Co KG February 6, 2007 | |
Bersani et al. | RFC 4764: The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method | |
Key | EMU Working Group T. Clancy Internet-Draft LTS Expires: December 28, 2006 H. Tschofenig Siemens June 26, 2006 | |
Pervaiz et al. | Security in wireless local area networks |