Slide 1/4 03/29/2012 83rd IETF Paris, France, March 25-30, 2012 “EAP support in smartcards” draft-urien-eap-smartcard-22.txt.

Slides:



Advertisements
Similar presentations
1 Java Card Technology Prepared by:Ali Toyserkani Adopted from: Introduction to Java Card Technology C. Enrique Ortiz.
Advertisements

Web-enabled Smart Card for Ubiquitous Access of Patients Medical Record Praveen G Puligundla.
Doc.: IEEE /1160 Submission NameAffiliationsAddressPhone George CherianQualcomm 5775 Morehouse Dr, San Diego, CA, USA
Operating Systems Manage system resources –CPU scheduling –Process management –Memory management –Input/Output device management –Storage device management.
Slide 1/7 03/17/03 56th IETF San Francisco CA, March 16-21, 2003 “EAP support in smartcards” My name is Pascal Urien, ENST Draft-urien-EAP-smartcard-01.txt.
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 “draft-urien-eap-smartcard-type-00.txt” EAP Smart Card Protocol (EAP-SC)
TCG Confidential Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 TNC EAP IETF EAP.
Small(er) Footprint for TLS Implementations Hannes Tschofenig Smart Object Security workshop, March 2012, Paris.
ISBN Chapter 1 Preliminaries. Copyright © 2004 Pearson Addison-Wesley. All rights reserved.1-2 Figure 1.1 The von Neumann computer architecture.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Web-based Distributed Flexible Manufacturing System (FMS) Monitoring and Control Student: Wei Liu Instructor: Dr. Chang Apr. 23, 2003.
Ubiquitous Access Control Workshop 1 7/17/06 Access Control and Authentication for Converged Networks Z. Judy Fu John Strassner Motorola Labs {judy.fu,
802.1x EAP Authentication Protocols
IEEE Wireless Local Area Networks (WLAN’s).
Ch 12 Distributed Systems Architectures
Master Thesis Proposal By Nirmala Bulusu Advisor – Dr. Edward Chow Implementation of Protected Extensible Protocol (PEAP) – An IEEE 802.1x wireless LAN.
EAP-SIM open source implementation status Michael Haberler Internet Foundation Austria.
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
CRM WEB UI – ARCHITECTURE- DEFINITIONS For More details please go to
Chapter 2 Database System Concepts and Architecture
Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization.
Slide 1/8 07/17/03 EAP 57th IETF WIEN, Austria, July 13-18, 2003 “EAP support in smartcards” Pascal Urien & All ENST Draft-urien-EAP-smartcard-02.txt.
Hsu-Chen Cheng, *Wen-Wei Liao, Tian-Yow Chi, Siao-Yun Wei
Unrestricted Connection manager MIF WG IETF 78, Maastricht Gaëtan Feige, Cisco (presenter) Pierrick Seïté, France Telecom -
CSC271 Database Systems Lecture # 4.
Slide 1 DESIGN, IMPLEMENTATION, AND PERFORMANCE ANALYSIS OF THE ISCSI PROTOCOL FOR SCSI OVER TCP/IP By Anshul Chadda (Trebia Networks)-Speaker Ashish Palekar.
EAP Bluetooth Extension Draft-kim-eap-bluetooth-00 Hahnsang Kim (INRIA), Hossam Afifi (INT), Masato Hayashi (Hitachi)
1 /10 Pascal URIEN, IETF 66 h, Wednesday July 12 th,Montreal, Canada draft-urien-badra-eap-tls-identity-protection-00.txt
Virtualization. What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer.
Ivo Rosol, OKsystem Middleware.
EAP Extensions for EAP Re- authentication Protocol (ERP) draft-wu-hokey-rfc5296bis-01 Yang Shi Qin Wu Zhen Cao
Doc.: 802_Handoff_Architecture_Elements_r2 Submission May David Johnston, IntelSlide 1 Architectural Elements of an 802 Handoff Solution David Johnston.
Chapter 2 Database System Concepts and Architecture Dr. Bernard Chen Ph.D. University of Central Arkansas.
EMU BOF EAP-TLS Experiment Report RFC 2716 Bernard Aboba Microsoft Thursday, November 10, 2005 IETF 64, Vancouver, CA.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
Pascal Urien Slide 1/6 55th IETF Atlanta, GA, November 17-21, 2002 “EAP support in smartcards” My name is Pascal Urien Draft-urien-EAP-smartcard-00.txt.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
1 Pascal URIEN, IETF 63th Paris, France, 2nd August 2005 “draft-urien-eap-smartcard-type-02.txt” EAP Smart Card Protocol (EAP-SC)
1 My Dream of Jini Fabio Kon Jalal Al-Muhtadi Roy Campbell M. Dennis Mickunas Department of Computer Science University of Illinois at.
Cryptography and Network Security Chapter 16 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
Network Access Control
RFC 2716bis Wednesday, July 12, 2006 Draft-simon-emu-rfc2716bis-02.txt Dan Simon Bernard Aboba IETF 66, Montreal, Canada.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
DHCP – Wireless Auth Standards stuff January CSG – Duke
TEE: TLS Authentication Using EAP draft-nir-tls-eap-02.txt Yoav Nir Yaron Sheffer (presenter) Hannes Tschofenig Peter Gutmann IETF-70, Vancouver, Dec.
August 2, 2005IETF63 EAP WG AAA-Key Derivation with Lower-Layer Parameter Binding (draft-ohba-eap-aaakey-binding-01.txt) Yoshihiro Ohba (Toshiba) Mayumi.
1 Extensible Authentication Protocol (EAP) Working Group IETF-57.
JAVA CARD Presented by: MAYA RAJ U C A S,PATHANAMTHITTA.
Forward Secure Signatures on Smart Cards A. Hülsing, J. Buchmann, C. Busold | TU Darmstadt | A. Hülsing | 1.
ISC321 Database Systems I Chapter 2: Overview of Database Languages and Architectures Fall 2015 Dr. Abdullah Almutairi.
August 4, 2004EAP WG, IETF 601 Authenticated service identities for EAP (draft-arkko-eap-service-identity-auth-00) Jari Arkko Pasi Eronen.
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 draft-urien-eap-smartcard-06.txt “EAP-Support in Smartcard”
Mary Ganesan and Lora Strother Campus Tours Using a Mobile Device.
Operations Management Board 19th Dec. 2013
Informing AAA about what lower layer protocol is carrying EAP
Giuseppe LA ROCCA INFN - Catania, Italy
WebRTC enabled multimedia conferencing and collaboration solution
Greg Bernstein Young Lee
Chapter 2 Database System Concepts and Architecture
58th IETF Minneapolis, MN, November 9-14, “EAP support in smartcards”
AN ENVIRONMENT FOR REMOTE CONTROL
Chapter 1 Preliminaries.
Cyber Security Authentication Methods
My name is Pascal Urien, ENST
Strong Password Authentication Protocols
Security Vulnerabilities in RPC (csci5931)
Peer-to-Peer Client-server.
Computer Networks CMSC417 Prof. Ashok K . Agrawala
Presentation transcript:

Slide 1/4 03/29/ rd IETF Paris, France, March 25-30, 2012 “EAP support in smartcards” draft-urien-eap-smartcard-22.txt

Slide 2/4 03/29/2012 Objectives EAP Methods for Secure Elements  Client and Server What are Secure Elements  Tamper resistant microcontrollers.  Small computing resources (typically RAM 10KB, E 2 PROM 72KB).  Most of them run a Java Virtual Machine,.NET is also supported.  SIM/USIM, Smart card, Secure Controller, NFC Controller. Resource constraints  Small memory footprint (typically < 32KB). ISO7816 interface  Generic EAP Method interface  Three use cases, with detailed test vectors. EAP-SIM, EAP-AKA, EAP-TLS

Slide 3/4 03/29/2012 General Architecture | EAP method| | EAP method| | Smartcard | | Smartcard | | Client | | Server | | Type = X | | Type = Y | ! ! | Smartcard | EAP method| | EAP method | Smartcard | | Interface | Type = Y | | Type = X | Interface | | Entity | | | | Entity | V ! | ! | | ! | | EAP ! Peer Layer | | EAP ! Auth. Layer | | ! | | ! | ! ! | ! | | ! | | EAP ! Layer | | EAP ! Layer | | ! | | ! | ! ! | ! | | ! | | Lower ! Layer | | Lower ! Layer | | ! | | ! | ! ! ! ! Authentication ! Peer ! Server >

Slide 4/4 03/29/2012 Conclusion Open Implementation Tested with multiple Secure Elements. Proposed as experimental RFC