March 2012 doc IEEE 802 11 1112 0378

  • Slides: 6
Download presentation
March 2012 doc. : IEEE 802. 11 -11/12 -0378 -00 -0 wng Key Centric

March 2012 doc. : IEEE 802. 11 -11/12 -0378 -00 -0 wng Key Centric Identity Date: 12 -03 -12 Authors: Submission Slide 1 Paul A. Lambert (Marvell)

November 2011 doc. : IEEE 802. 11 -11/12 -0378 -00 -0 wng Public Key

November 2011 doc. : IEEE 802. 11 -11/12 -0378 -00 -0 wng Public Key Based Authentication Key pairs are used in an authentication exchange that proves that an entity “holds” a particular public key Private Key Public Key K 2 K 1 K 2 Public Keys can be openly shared Submission Slide 2 Clint Chaplin, Chair (Samsung)

March 2012 doc. : IEEE 802. 11 -11/12 -0378 -00 -0 wng Identity •

March 2012 doc. : IEEE 802. 11 -11/12 -0378 -00 -0 wng Identity • Public keys are the primary authentication mechanism • Why not use public keys as a primary identity? – Most identifiers require central coordination (like MAC address, DNS names, etc) – Public keys are large numbers that are by definition unique Submission Slide 3 Clint Chaplin, Chair (Samsung)

November 2011 doc. : IEEE 802. 11 -11/12 -0378 -00 -0 wng Access Control

November 2011 doc. : IEEE 802. 11 -11/12 -0378 -00 -0 wng Access Control with Public Keys as Identity K 1 K 2 Can K 1 enter network? K 1 Access control servers do NOT need to hold any secrets Submission Slide 4 Clint Chaplin, Chair (Samsung)

March 2012 doc. : IEEE 802. 11 -11/12 -0378 -00 -0 wng Hashing Public

March 2012 doc. : IEEE 802. 11 -11/12 -0378 -00 -0 wng Hashing Public Keys • Public keys can be large • Hashing can be used to create a smaller and still unique identifier Submission Slide 5 Clint Chaplin, Chair (Samsung)

March 2012 doc. : IEEE 802. 11 -11/12 -0378 -00 -0 wng Hashing Keys

March 2012 doc. : IEEE 802. 11 -11/12 -0378 -00 -0 wng Hashing Keys to Form Addresses • Public keys can even be used as an address using a hash 46 bits of hash(K 1, Ni) Submission Slide 6 Clint Chaplin, Chair (Samsung)