Pairwise key derivation using PRF-512 for Wi-Fi Security Access (WPA) -

From: Singh, Alok (Alok.Singh_at_analog.com)
Date: 02/13/04

  • Next message: Phillip McCollum: "Re: Securing webmail - changing a port necessary to ensure security?"
    Date: Fri, 13 Feb 2004 10:17:32 -0500
    To: <security-basics@securityfocus.com>
    
    

    Hi,
       WPA uses PRF-512 to generate the Pairwise Transient key. The
    algorithm takesi - pairwise master key(32 bytes), a char string, the MAC
    addresses of client and AP, the nonces provided by client and AP - as the inputs
    , and generates 64 byte output. Is anybody aware of the test vectors for this
    algorithm ? The test vector should consist of Pairwise Master Key, client MAC
    address, AP Mac address, Client Nonce, AP Nonce. 802.11i draft 7.0 does provide
    a test vector but it looks confusing and not much details have been provided..

    Please let me know if you are aware of such test vectors?
       

    regards,
    alok
    (91) 9848309728

    ---------------------------------------------------------------------------
    Free trial: Astaro Security Linux -- firewall with Spam/Virus Protection

    Protect your network with the comprehensive security solution that
    integrates six applications for ease of use and lower TCO.

    Firewall - Virus protection - Spam protection - URL blocking - VPN
    - Wireless security.

    Download 30-day evaluation at:
    http://www.astaro.com/php/contact/securityfocus.php
    ----------------------------------------------------------------------------


  • Next message: Phillip McCollum: "Re: Securing webmail - changing a port necessary to ensure security?"