40 likes | 46 Views
This document provides guidelines for the usage of the Extensible Messaging and Presence Protocol (EMSK) in deriving keys for multiple applications using the EAP key derivation framework. It discusses the key framework draft, key naming, and examples of EMSK usage to promote the derivation of computationally independent keys for various applications.
E N D
EMSK Usage Guidelines(EAP key derivation for multiple applications) draft-salowey-eap-key-deriv-02.txt J. Salowey P. Eronen IETF 58
EMSK • 2284bis defines and reserves EMSK. • Several applications have been suggested for it • draft-ietf-eap-keying-01.txt • draft-irtf-aaaarch-handoff-04.txt • draft-salowey-eap-protectedtlv-01.txt • Others
Key Framework Draft • Usage guidelines for the EMS need to be established • Key Naming needs to be fleshed out (deriving names directly from keys may not be such a good idea) • Examples of EMSK usage should promote usage of the EMSK such that computationally independent keys can be derived for several applications (i.e. the guideline draft)
Next Step • Incorporate the EMSK Guideline draft into the key framework draft or reference it.