{"draft":"draft-arkko-eap-aka-kdf-10","doc_id":"RFC5448","title":"Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA')","authors":["J. Arkko","V. Lehtovirta","P. Eronen"],"format":["ASCII","HTML"],"page_count":"29","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"IETF - NON WORKING GROUP","abstract":"This specification defines a new EAP method, EAP-AKA', which is a\r\nsmall revision of the EAP-AKA (Extensible Authentication Protocol\r\nMethod for 3rd Generation Authentication and Key Agreement) method.\r\nThe change is a new key derivation function that binds the keys\r\nderived within the method to the name of the access network. The new\r\nkey derivation mechanism has been defined in the 3rd Generation\r\nPartnership Project (3GPP). This specification allows its use in EAP\r\nin an interoperable manner. In addition, EAP-AKA' employs SHA-256\r\ninstead of SHA-1.\r\n\r\nThis specification also updates RFC 4187, EAP-AKA, to prevent bidding\r\ndown attacks from EAP-AKA'. This memo provides information for the \r\nInternet community.","pub_date":"May 2009","keywords":["EAP","AKA","AKA'","3GPP"],"obsoletes":[],"obsoleted_by":[],"updates":["RFC4187"],"updated_by":["RFC9048"],"see_also":[],"doi":"10.17487\/RFC5448","errata_url":null}