ITU-T X.1034 PDF

ITU-T X.1034 PDF

Name:
ITU-T X.1034 PDF

Published Date:
04/01/2008

Status:
[ Revised ]

Description:

Guidelines on extensible authentication protocol based authentication and key management in a data communication network

Publisher:
International Telecommunication Union-T

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
Need Help?

The extensible authentication protocol (EAP) is an authentication framework that supports multiple authentication mechanisms between a supplicant and an authentication server. EAP can work directly over lower layers, e.g., data link layer such as point-to-point protocol (PPP), IEEE 802, CDMA2000, UMTS, or VDSL/ADSL. For example, IEEE 802.1X is a typical transport mechanism for EAP over 802 LANs. The EAP basically performs authentication for a device attached to a LAN, establishing secure point-to-point connection or preventing access by an unauthorized device. In other words, EAP can be used to authenticate the supplicant wishing to access the network. The AAA function may be used as one of the key functions for lower-layer security of a data communication network. AAA enables transporting the secret key from the authentication server to the authenticator. Thus, defining the requirements of the EAP method and key management protocol, establishing criteria for selecting an optimal EAP method among several existing EAP methods, and defining a suitable framework for EAP and an optimal key management protocol including key derivation methods for lower-layer security in end-to-end data communication are essential. This Recommendation applies mainly to EAP-based authentication and key management protocol for data communication with a wireless access network, where communication through the wireless access network should be protected by the key material derived from the key management protocol.

This Recommendation describes a framework for authentication and key management to secure the lower layer in data communication. It also provides guidance on the selection of EAP methods for a data communication network, and describes the mechanism for key management and possible key hierarchy for lower-layer security in a data communication network. This Recommendation is to provide complete sets for EAP-based authentication itself but also the key management from the threat analysis to requirements, allowing the network operator to choose an adequate EAP method by using some criteria described for a specific network environment.


Edition : 08
Number of Pages : 30
Published : 04/01/2008

History

ITU-T X.1034
Published Date: 02/01/2011
Guidelines on extensible authentication protocol based authentication and key management in a data communication network
$12.3
ITU-T X.1034
Published Date: 04/01/2008
Guidelines on extensible authentication protocol based authentication and key management in a data communication network

Related products

ITU-T L.2 FRENCH
Published Date: 11/01/1988
IMPRÉGNATION DES POTEAUX EN BOIS
$6
ITU-T Y.1321 SPANISH
Published Date: 03/01/2001
Protocolo Internet por la jerarquía digital síncrona que utiliza el procedimiento de acceso al enlace de la jerarquía digital síncrona
$24.9
ITU-T M.820 SPANISH
Published Date: 11/01/1988
PERIODICIDAD DE LAS MEDIDAS DE MANTENIMIENTO EN LOS ENLACES INTERNACIONALES DE TELEGRAFÍA ARMÓNICA
$6

Best-Selling Products

CAN/CSA-IEC/TS 61000-3-5:12 (R2021)
Published Date: 06/01/2012
Electromagnetic compatibility (EMC) - Part 3-5: Limits - Limitation of voltage fluctuations and flicker in low-voltage power supply systems for equipment with rated current greater than 75 A (Adopted IEC/TS 61000-3-5:2009, edition 2.0, 2009-07)
$14.1
CAN/CSA-IEC/TS 62600-4:22
Published Date: 10/18/2022
Marine energy -- Wave, tidal and other water current converters -- Part 4: Specification for establishing qualification of new technology
$46.8