eap-8 Page:2
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17 

Observations
Some EAP methods derive keys, some don’t
Where keys are derived, strength varies widely
The type of keys derived varies as well
Some methods derive ciphersuite-specific “session keys”
Some methods derive ciphersuite-independent “master keys”
Some methods describe key hierarchy, some don’t


PPT Version