Mission Critical Push-to-Talk (MCPTT) Group Key Transport using MIKEY- SAKKE
draft-barnes-mikey-sakke-mcptt-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Authors | Mary Barnes , Andrew Allen | ||
Last updated | 2016-11-27 (Latest revision 2016-05-26) | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
3GPP TS 33.179 defines the group services and system aspects for the Security of Mission Critical Push-To-Talk (MCPTT) service. To create a group's security association, a Group Master Key (GMK) and associated identifier (GMK-ID) is distributed to MCPTT User Equipment (UE) by a Group Management Server (GMS). The GMK is distributed encrypted specifically to a user and signed using an identity representing the Group Management Server. The GMK is distributed within a Group Key Transport payload, which is a MIKEY-SAKKE I_MESSAGE, as defined in RFC 6509, which ensures the confidentiality, integrity and authenticity of the payload. In order to convey the MCPTT specific service in the MIKEY-SAKKE I_MESSAGE, this document defines new values for the Type field of the General Extensions Payload Field defined for MIKEY in RFC 3830 the ID Role field in RFC 6043 and the ID Scheme field in RFC 6509.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)