Rfc 5448 Eap - Aka
نویسندگان
چکیده
This specification defines a new EAP method, EAP-AKA’, which is a small revision of the EAP-AKA (Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement) method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in the 3rd Generation Partnership Project (3GPP). This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA’ employs SHA-256 instead of SHA-1.
منابع مشابه
Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)
This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is ...
متن کاملNetwork Working Group Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (eap-aka)
This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is ...
متن کاملSubscriber Identity Module ( UMTS Subscriber Identity
Status of this Memo This document is an Internet-Draft and is subject to all provisions of section 3 of RFC 3667. By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she become aware will be disclosed, in accordance with RFC 3668. Internet-Drafts are working do...
متن کاملInternet - Draft EAP - AKA ’ August 2008
This specification defines a new EAP method, EAP-AKA’, a small revision of the EAP-AKA method. The change is a new key derivation function that binds the name of the access network to the keys derived within the method. The new key derivation mechanism has been defined in 3GPP. This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA’ employs a new hash function...
متن کاملArkko and Haverinen Expires in Six Months [page 1] Eap Aka Authentication
This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the UMTS AKA authentication mechanism. AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. AKA provides also backward compatibility to GSM authentication, making it possible to use EAP AKA for authentic...
متن کامل