What is a Key Hierarchy? A description of how the session keys required by a particular cipher are derived from the keying material provided by the EAP methods Implies that you need a hierarchy per ciphersuite/media Desirable characteristics Key strength (64 bits typically not enough) “Cryptographic separation” between keys used for different purposes (encryption, authentication/integrity, unicast/multicast, etc.) |