Internet - Draft EAP - AKA ’ September 2008 1
نویسندگان
چکیده
This specification defines a new EAP method, EAP-AKA’, a small revision of the EAP-AKA method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in 3GPP. This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA’ employs SHA256 instead of SHA1.
منابع مشابه
Internet - Draft EAP - AKA ’ September
This specification defines a new EAP method, EAP-AKA’, a small revision of the EAP-AKA method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in 3GPP. This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA’ employs SHA-256 instead of ...
متن کاملInternet - Draft EAP - AKA ’ August 2008
This specification defines a new EAP method, EAP-AKA’, a small revision of the EAP-AKA method. The change is a new key derivation function that binds the name of the access network to the keys derived within the method. The new key derivation mechanism has been defined in 3GPP. This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA’ employs a new hash function...
متن کاملInternet - Draft EAP - AKA ’ October 2008
This specification defines a new EAP method, EAP-AKA’, a small revision of the EAP-AKA method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in the 3rd Generation Partnership Project (3GPP). This specification allows its use in EAP in an interoperable manner. In addit...
متن کاملInternet - Draft EAP - AKA
This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Universal Mobile Telecommunications System (UMTS) Authentication and Key Agreement (AKA) mechanism. UMTS AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. EAP-AKA includes optional identity privac...
متن کاملSubscriber Identity Module ( UMTS Subscriber Identity
Status of this Memo This document is an Internet-Draft and is subject to all provisions of section 3 of RFC 3667. By submitting this Internet-Draft, each author represents that any applicable patent or other IPR claims of which he or she is aware have been or will be disclosed, and any of which he or she become aware will be disclosed, in accordance with RFC 3668. Internet-Drafts are working do...
متن کامل