RFC (part 1 of 5): Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM ). EAP-SIM RFC is a newly emerged EAP authentication The standard for EAP-SIM authentication is still in draft form with the IETF . but are not limited to, RFCs, the products of another standards body (e.g. 3GPP ), EAP-AKA’ AT_KDF Key Derivation Function values; Trusted Non-3GPP 12, AKA-Notification and SIM-Notification, [RFC][RFC].

Author: Kilrajas Tojazshura
Country: Martinique
Language: English (Spanish)
Genre: Video
Published (Last): 28 August 2006
Pages: 257
PDF File Size: 14.56 Mb
ePub File Size: 3.77 Mb
ISBN: 734-8-60331-848-8
Downloads: 3797
Price: Free* [*Free Regsitration Required]
Uploader: Fenribar

Key distribution Cryptography Session key Documentation. The permanent identity is usually based on the IMSI.

EAP is an authentication framework for providing the transport and usage of keying material and parameters generated by EAP methods. The alternative is to use device passwords instead, but then the device is validated on the sap not the user.

EAP-AKA and EAP-SIM Parameters

Distribution of this memo is unlimited. BlunkJohn R. In particular, the following combinations are expected to be used in practice:. It was co-developed by Funk Software and Certicom and is widely supported across platforms.

Used on full authentication only. Protected Extensible Authentication Protocol. This greatly simplifies the setup procedure since a certificate is not needed on every client. A3 and A8 Algorithms By clicking accept or continuing to use the site, you agree to the terms outlined in our Privacy PolicyTerms of Serviceand Dataset License.


EAP-AKA and EAP-SIM Parameters

The underlying key exchange is resistant to active attack, passive attack, and dictionary attack. Sung Ya-ChinY. Pseudonym Identity A pseudonym identity of the peer, including an NAI realm portion in environments where a realm is used. Retrieved from ” https: Showing of 27 references. The GSM authentication and key exchange algorithms are not used in the fast re-authentication procedure.

Archived from the original on February 9, This is a requirement in RFC sec 7. Archived from the original on 26 November For example, in IEEE It provides a protected communication channel, when mutual authentication is successful, for both parties to communicate and is designed for authentication over insecure networks such as IEEE Fast re-authentication is based on keys derived on full authentication.

Extensible Authentication Protocol

The packet format and the use of attributes are specified in Section 8. The peer has derived the same keying material, so the authenticator does not forward the keying material to the peer along with EAP-Success. Lightweight Extensible Authentication Protocol. Pseudonym Username The username portion of pseudonym identity, i. From Wikipedia, the free encyclopedia. Permanent Username Xim username portion of permanent identity, i.


Information on RFC ยป RFC Editor

If the peer has maintained state information for fast re-authentication and wants to use fast re-authentication, then the peer indicates this by using a specific fast re-authentication efc instead of the permanent identity or a pseudonym identity. Views Read Edit View history. Targeting the weaknesses in static WEP”. The IETF has also not reviewed the security of the cryptographic algorithms. There are currently about 40 different methods defined.

Showing of 67 extracted citations. The authenticator typically communicates with an EAP server dim is located on a backend authentication server using an AAA protocol. It does not specify an Internet standard of any kind. EAP is not a wire protocol ; instead it only defines message formats. Attacks Against Identity Privacy The standard also describes the conditions under which the AAA key management requirements described in RFC 486 be satisfied.

Mutual Authentication and Triplet Exposure Flooding the Authentication Centre