eap-8 Page:9
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17 

What is a Key Hierarchy?
A description of how the session keys required by a particular cipher are derived from the keying material provided by the EAP methods
Implies that you need a hierarchy per ciphersuite/media
Desirable characteristics
Key strength (64 bits typically not enough)
“Cryptographic separation” between keys used for different purposes (encryption, authentication/integrity, unicast/multicast, etc.)
PPT Version