CFP last date
20 January 2025
Reseach Article

Article:Analyzing EAP TLS & ERP Protocol with varying processor speed

by Bhawna Gupta, Seema Mehla
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 13
Year of Publication: 2010
Authors: Bhawna Gupta, Seema Mehla
10.5120/1336-1774

Bhawna Gupta, Seema Mehla . Article:Analyzing EAP TLS & ERP Protocol with varying processor speed. International Journal of Computer Applications. 7, 13 ( October 2010), 50-54. DOI=10.5120/1336-1774

@article{ 10.5120/1336-1774,
author = { Bhawna Gupta, Seema Mehla },
title = { Article:Analyzing EAP TLS & ERP Protocol with varying processor speed },
journal = { International Journal of Computer Applications },
issue_date = { October 2010 },
volume = { 7 },
number = { 13 },
month = { October },
year = { 2010 },
issn = { 0975-8887 },
pages = { 50-54 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume7/number13/1336-1774/ },
doi = { 10.5120/1336-1774 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:56:14.848386+05:30
%A Bhawna Gupta
%A Seema Mehla
%T Article:Analyzing EAP TLS & ERP Protocol with varying processor speed
%J International Journal of Computer Applications
%@ 0975-8887
%V 7
%N 13
%P 50-54
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Extensible Authentication Protocol is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. Microsoft has developed EAP TLS which is an authentication protocol based on TLS (Transport Layer Security). Authentication server and client use TLS protocol to negotiate session key. The EAP re-authentication Protocol provides a consistent, method-independent and low-latency re-authentication. It is extension to current EAP mechanism to support intra-domain handoff authentication. This paper analyzed the security cost of EAP TLS & ERP with increased processor speed.

References
  1. H. Krawczyk, M. Bellare, ”HMAC: Keyed-Hashing for Message Authentication,” IETF RFC 2104, February 1997
  2. O. Elkeelany, M.M. Matalgah, Performance analysis of IPSec protocol: encryption and authentication, in: IEEE Communications Conference (ICC 2002), 2002, pp. 1164 -1168
  3. Federal Information Processing Standards Publication Specifications for the Secure Hash Standard, August, 2002
  4. H. Orman, Purple Streak Dev., RFC 3766 Determining Strengths For Public Keys Used For Exchanging Symmetric Keys, April 2004
  5. B. Aboba, L. Blunk, J. Vollbrecht, Extensible Authentication Protocol (EAP), IETF RFC 3748 June 2004
  6. P. Calhoun, J. Loughney, E. Guttman, Diameter Base Protocol , IETFRFC 3588, September 2004
  7. P. Eronen, Diameter Extensible Authentication Protocol Application, IETF RFC 4072, August 2005
  8. B. Aboba, M. Beadles, Network Access Identifier (NAI), IETF RFC4282, December 2005
  9. C. Kaufman, Internet Key Exchange (IKEv2) Protocol, RFC 4306, December 2005
  10. T. Clancy, draft-ietf-hokey-reauth-ps-02, "Handover Key Management and Re-authentication Problem Statement", July, 2007
  11. Kaouthar Sethom, “Requirements and Adaptation Solutions for Transparent Handover between Wifi and Bluetooth”, Mobile Computing and Communications Review, Volume 8, Number 1, pp. 61-83, San Jose State University, San Jose, CA, USA.
  12. Bernard Aboba, Dan Simon, "Extensible Authentication Protocol(EAP) Key Management Framework", IETF draft-ietf-eap-keying-, November 2007
  13. V. Narayanan, "EAP Extensions for EAP Re--authentication Protocol (ERP)", IETF draft-ietf-hokey-erx-14, March, 2008.
  14. “benchmarks for cryptographic algorithms” unpublishedhttp://www.eskimo.com/~weid/benchmarks.html ietf-hokey-key-mgm-03, February , 2008.
  15. M. Nakhjiri, Y. Ohba, "Derivation, delivery and management of EAP based keys for handover and re-authentication ", IETF draft
  16. D. Simon,B. Aboba, R. Hurst, RFC 5216 The EAP-TLS Authentication Protocol, March 2008.
  17. Carolin Latze, Ulrich Ultes-Nitsche, Strong Mutual Authentication in a User-Friendly Way in EAP-TLS.
  18. V. Narayanan, L. Dondeti, "Diameter Support for EAP Re-authentication Protocol "IETF draft-dondeti-dime-erp-diameter-01, November, 2007
  19. R Housely, B.Aboba, Guidance for AAA key management, RFC 4296,July 2008
Index Terms

Computer Science
Information Sciences

Keywords

ERP EAP-TLS EMSK RADIUS