aaa-5----Page:4
1  2  3  4  5 

Acceptable solution MUSTů
Be algorithm independent protocol
For interoperability, select at least one suite of algorithms that MUST be implemented
Establish strong, fresh session keys
Maintain algorithm independence
Include replay detection mechanism
Authenticate all parties
Maintain confidentiality of authenticator
NO plaintext passwords
PPT Version