----- Original Message -----
Sent: Wednesday, July 21, 2004 9:12
PM
Subject: [STDS-802-16] [Àüüȸ½Å]
[STDS-802-16] Cleaning up 802.16e security
Hi, DJ and all.
I would like to comment on the approaches of PKMv2 to
upgrade the current PKMv1.
In my opinion, when we upgrade or revise the currently fixed
specifications, we shall provide the backward compatibility to the older
one. Even in the case of backward compatibility cannot be fully supported,
we should clearly resolve the known problems in the current specification by
maximizing the reusability of the current one. But, the PKMv2 overlooked
these issues.
Currently proposed PKMv2 is a new and separate PKM protocol
with PKMv1. The Key hierarchy (C802.16e-188r2) is different with that of
PKMv1 (It is more systematically designed and conceptually better than the
older one, but it is not compatible with that). The Key lengths are
different and the input parameters are different, even if to the same
algorithms:
- PKMv1 AK = 160 bits,
PKMv2 AK = 128 bits;
- PKMv1 & PKMv2 HMAC Key
Derivation Function is different, even though the SHA-1 algorithm is used to
both, and its key length (160 vs. 128) and input parameters too.
And the PKMv2 uses the newly defined AES_Key_Wrap for
transferring keys as mandatory feature for PKMv2 (In session #32, the
AES_Key_Wrap was accepted already. But, I hope it will to be modified to
include the older key transferring mechanisms).
Anyway, we can say the current PKMv2 (and its key hierarchy
(188r2)) is not backward compatible with PKMv1. And it is not fully
supported one of the most important goals and requirements of the
PKMv2 - "It should be backward compatible with the existing PKMv1." (See Ad
Hoc documents: Jeff Mandin, "PKMv2 - Goals and Requirements"; David
Johnston, "A New PKM for 802.16")
As you know, TGe PAR (IEEE
802.16-02/48r4, approved in 2002-12-11, and the only valid one) state that
the following two types of interoperability (or backward compatibility)
should be supported: "Subscriber stations specified herein, within
stationary, shall interoperate with base stations in IEEE Std 802.16a. Base
stations specified herein shall interoperate with stationary subscriber
stations specified in IEEE Std 802.16a." The exact meaning of IEEE Std
802.16a should be interpreted as IEEE Std 802.16-2004.
On the basis of that PAR statement, the TGe-based MSS, when
stationary, shall be interoperable with the TGd-based BSs (supporting PKMv1
only), but the PKMv2 is not backward compatible with PKMv1 so that the
requirements are not fulfilled. And the TGd-based BS shall interoperate with
the TGd-based SS (supporting PKMv1 only), but when the TGe-based BS cannot
provide the PKMv1 capability, the requirements are not satisfied, too.
Therefore, in order to provide the backward compatibility
(and/or interoperability) with TGd, the TGe-based MSSs and BSs shall provide
both of the PKMv1 and PKMv2 capabilities. It is a too much burden and the
duplicated functionality to the MSSs.
Generally speaking, I hope that the PKMv2 should support the
various possibilities of authorization and encryption modes as a superset of
including PKMv1 concepts.
Fortunately, DJ proposed and showed me the modified Key
hierarchy mechanism (188r3) to mitigate our uneasiness by introducing the
HMAC SHA-1 key generation, and modified to change the proposal to allow
EAP-only mode. We have been reviewing the proposal and we would like to
propose an alternative by slightly change the DJ's proposal to maximize the
backward compatible and reusable features with PKMv1. By doing that, we can
reduce the overhead of implementing the two completely different mechanisms
in each Mobile subscriber station, and will get a soft-landing from PKMv1 to
PKMv2.
Sincerely,
Chulsik Yoon,
Senior Engineer,
ETRI
P.S.
I would like to mention the data encryption issue of PKMv2,
not relating to the Key hierarchy issue.
In PKMv2, we have generally agreed on using the AES
algorithm for key management and data encryption. So, in my thought, if we
select the PKMv2 based key management methodology, then we will also use the
AES algorithm (not the DES algorithm) for data encryption. In the current
specification, only the AES-CCM mode can be provided to data encryption
using AES algorithm. Even thought, the AES-CCM can provide the high security
capabilities by using the Counter and Message Integrity Check with AES, it
needs a large amount of overhead (total 12 bytes of overhead per PDU; 4
bytes PN and 8 bytes of Cypertext ICV). In my opinion, most of the user
service needs not this type of highly secure mechanisms, except the monetary
transactions such as internet banking, mobile commerce, etc. Therefore, the
another AES mode (not CCM), not having too much overhead for data encryption
transaction, need to be added to the current security mechanisms in IEEE
802.16 specifications.
Thank You.
¿øº» ³»¿ë:
º¸³½»ç¶÷:
owner-stds-802-16@listserv.ieee.org[dj.johnston@INTEL.COM]
¹Þ´Â»ç¶÷: STDS-802-16@listserv.ieee.org
Á¦¸ñ:
[STDS-802-16] Cleaning up 802.16e security
¹ÞÀº³¯Â¥:
2004/07/17 Åä 12:15
All,
I think the input to the
security work went rather well. We got most of the underlying mechanisms in
the spec. Compare this with the time it took 802.11i to get to this stage.
Of course we had the benefit of their hindsight.
As some of us discussed in the meeting, there are a few
things to be done with the security work but also there seems to be
agreement that we need to identify and limit the list of things we need to
do, in order to bring the work to a close.
My list of things to be done is as follows:
EAP Key agreement
Generic Management Frame Protection
PKMv2 Key Hierarchy
PKMv2 Security State Machines
Test Vectors (for the crypto algorithms operating
over packets)
Vulnerability
analysis/corrections
General
clean up of the contributions that were accepted (we have LB14c for
that)
I have vague memories of Jeff having another
item for this list but its leaked from my head.
I
will try to coordinate a consensus position on what the key heirarchy should
be. So I'd appreciate comment on it. Particularly from anyone who disliked
the current proposal enough to vote against it. I don't think the discussion
in the meeting shed much light on what the concerns were, since I still
don't know.
EAP Key agreement is in a similar situation. Jeff provided
text, but it didn't pass. Therefore any input on what is needed to make it
pass is welcome.
Anyone who can commit to filling in other parts of the
framework should declare their interest, so people interested in
contributing to the same areas can compare notes.
Hopefully we can reach some sort of consensus before the
next meeting.
Regards,
DJ