ABSTRACT

Recommendation for EAP Methods Used in Wireless Network Access Authentication   [open pdf - 721KB]

"This Recommendation specifies security requirements for authentication methods with key establishment supported by the Extensible Authentication Protocol (EAP) defined in IETF RFC 3748 for wireless access authentications to federal networks. [...] As different wireless technologies are launched to enable user mobility and provide pervasive network and service accessibility, security has been a prominent requirement for U.S. Federal Government in such access environments. Access authentication and the establishment of keys that protect wireless traffic are both core security components in wireless applications. The Extensible Authentication Protocol (EAP) is a framework for access authentication which supports different authentication methods that are specified in EAP methods. In addition to authentication, some new EAP methods derive keys that can be used to protect the wireless link. Numerous EAP methods have been published as IETF RFCs and implemented by various vendors. Currently, EAP has been adopted by various wireless standards as an access authentication and key establishment protocol."

Report Number:
NIST Special Publication 800-120
Author:
Publisher:
Date:
2008-12
Copyright:
Public Domain
Retrieved From:
National Institute of Standards and Technology: http://www.nist.gov/
Format:
pdf
Media Type:
application/pdf
URL:
Help with citations