2008
DOI: 10.17487/rfc5296
|View full text |Cite
|
Sign up to set email alerts
|

EAP Extensions for EAP Re-authentication Protocol (ERP)

Abstract: Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
100
0

Year Published

2008
2008
2011
2011

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 69 publications
(100 citation statements)
references
References 12 publications
0
100
0
Order By: Relevance
“…In common scenarios, an EAP peer and an EAP server authenticate each other through an EAP authenticator. Successful authentication results in a derivation of a Transient Session Key (TSK) by the EAP peer using the MSK [15]. To avoid unnecessary delays and roundtrips, it is desirable to avoid full EAP authentication when a peer moves from one authenticator to another.…”
Section: Hokeymentioning
confidence: 99%
See 3 more Smart Citations
“…In common scenarios, an EAP peer and an EAP server authenticate each other through an EAP authenticator. Successful authentication results in a derivation of a Transient Session Key (TSK) by the EAP peer using the MSK [15]. To avoid unnecessary delays and roundtrips, it is desirable to avoid full EAP authentication when a peer moves from one authenticator to another.…”
Section: Hokeymentioning
confidence: 99%
“…The main idea behind ERP is to permit a peer and the server to verify the possession of keying material which has been previously obtained from an EAP method [15]. And more importantly, this EAP is a single-round trip exchange between peer and server.…”
Section: Hokeymentioning
confidence: 99%
See 2 more Smart Citations
“…In particular, [RFC5295] defines how to create a usagespecific root key (USRK) for bootstrapping security in a specific application, a domain-specific root key (DSRK) for bootstrapping security of a set of services within a domain, and a usage-specific DSRK (DSUSRK) for a specific application within a domain. [RFC5296] defines a re-authentication root key (rRK) that is a USRK designated for re-authentication.…”
Section: Introductionmentioning
confidence: 99%