Extensible Authentication Protocol Overview and Its Applications

作者: Heung Youl YOUM

DOI: 10.1587/TRANSINF.E92.D.766

关键词:

摘要: The Extensible Authentication Protocol (EAP) is an authentication framework that supports multiple mechanisms [38] between a peer and server in data communication network. EAP used as useful tool for enabling user distribution of session keys. There are numerous methods have been developed by global SDOs such IETF, IEEE, ITU-T, 3GPP. In this paper, we analyze the most widely deployed ranging from EAP-TLS [27] to EAP-PSK [25]. addition, derive security requirements meet, evaluate typical terms requirements, discuss features existing widely-deployed methods. identify two use cases Finally, recent standardization activities area reviewed.

参考文章(25)
Jari Arkko, Pasi Eronen, Vesa Lehtovirta, Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA') RFC. ,vol. 5448, pp. 1- 29 ,(2009)
Mihir Bellare, Phillip Rogaway, Entity authentication and key distribution international cryptology conference. pp. 232- 249 ,(1993) , 10.1007/3-540-48329-2_21
R. Canetti, H. Krawczyk, M. Bellare, HMAC: Keyed-Hashing for Message Authentication RFC. ,vol. 2104, pp. 1- 11 ,(1997)
W. Simpson, The Point-to-Point Protocol (PPP) RFC. ,vol. 1548, pp. 1- 53 ,(1993)
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017
B. Aboba, D. Simon, PPP EAP TLS Authentication Protocol Internet RFC-2716. ,vol. 2716, pp. 1- 24 ,(1999)
T. Wu, The SRP Authentication and Key Exchange System RFC. ,vol. 2945, pp. 1- 8 ,(2000)
Hadj Bourdoucen, Ali Al Shidhani, Ahmed M. Al Naamany, IEEE 802.11 Wireless LAN Security Overview ,(2006)