| Thread Links | Date Links | ||||
|---|---|---|---|---|---|
| Thread Prev | Thread Next | Thread Index | Date Prev | Date Next | Date Index |
two ways: it is non-secret and can be re-used. As such, salt values are available to many applications. ...
HKDF without having to protect the secrecy of the salt. In a different application domain, a key agreement protocol deriving cryptographic keys from a Diffie-Hellman exchange can derive a salt value from public nonces exchanged and authenticated between communicating parties as part of the key agreement (this is the approach taken in [IKEv2])."
In STD 802.11 PMKID is exchanged (say in an Association Request) so that the receiver can find the correct PMK basedon the PMKID. PMKID is known to both sides in a secure ranging session and the PTKSA derived from thesame PMK that derives the PMKID (or PMKID otherwise bound to the PMK) protects the negotiationexchange(s).
Passing PMKID in ranging negotiations (*FTM, LMR etc) is not required; if there is a PMK/PMKIDmismatch, it is not possible for the receiver to decrypt the secret key and the PMKID/Salt from theencrypted *FTM/LMR (whose protection key is derived from the PTKSA (and PMK))and use it in any way. The secret key is securely sent during the negotiations under PTKSAprotection and is used with the PMKID/Salt to compute the TRNs using HKDF definedby RFC5869
Hope this helps.
Thanks,
- NTo unsubscribe from the STDS-802-11-TGAZ list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGAZ&A=1
Attachment:
smime.p7s
Description: S/MIME Cryptographic Signature