Security Basics mailing list archives
Pairwise key derivation using PRF-512 for Wi-Fi Security Access (WPA) -
From: "Singh, Alok" <Alok.Singh () analog com>
Date: Fri, 13 Feb 2004 10:17:32 -0500
Hi, WPA uses PRF-512 to generate the Pairwise Transient key. The algorithm takesi - pairwise master key(32 bytes), a char string, the MAC addresses of client and AP, the nonces provided by client and AP - as the inputs , and generates 64 byte output. Is anybody aware of the test vectors for this algorithm ? The test vector should consist of Pairwise Master Key, client MAC address, AP Mac address, Client Nonce, AP Nonce. 802.11i draft 7.0 does provide a test vector but it looks confusing and not much details have been provided.. Please let me know if you are aware of such test vectors? regards, alok (91) 9848309728 --------------------------------------------------------------------------- Free trial: Astaro Security Linux -- firewall with Spam/Virus Protection Protect your network with the comprehensive security solution that integrates six applications for ease of use and lower TCO. Firewall - Virus protection - Spam protection - URL blocking - VPN - Wireless security. Download 30-day evaluation at: http://www.astaro.com/php/contact/securityfocus.php ----------------------------------------------------------------------------
Current thread:
- Pairwise key derivation using PRF-512 for Wi-Fi Security Access (WPA) - Singh, Alok (Feb 13)