EAP-Based Keying for IP Mobility Protocols
draft-vidya-eap-usrk-ip-mobility-01
Document | Type |
Expired Internet-Draft
(individual in sec area)
Expired & archived
|
|
---|---|---|---|
Authors | Vidya Narayanan , Gerardo Giaretta | ||
Last updated | 2015-10-14 (Latest revision 2007-11-16) | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | WG state | (None) | |
Document shepherd | (None) | ||
IESG | IESG state | Expired (IESG: Dead) | |
Action Holders |
(None)
|
||
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | Tim Polk | ||
IESG note | |||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
EAP [1] is increasingly used for network access authentication in various networks. Also, key generating EAP methods are being adopted in various systems for the purposes of cryptographic protection between an EAP peer and an enforcement point in the network. Key generating EAP methods produce an MSK and an EMSK in accordance with [1]. The MSK is meant for use by the EAP lower layer at the peer and the authenticator and is used differently by various lower layers. The EMSK hierarchy is defined in [2]. The EMSK hierarchy is meant to be extensible to derive keys for various usages. This document defines the key hierarchy and key derivations for using the EMSK hierarchy for keying in IP mobility protocols.
Authors
Vidya Narayanan
Gerardo Giaretta
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)