Security Basics mailing list archives

Pairwise key derivation using PRF-512 for Wi-Fi Security Access (WPA) -


From: "Singh, Alok" <Alok.Singh () analog com>
Date: Fri, 13 Feb 2004 10:17:32 -0500

Hi,
   WPA uses PRF-512 to generate the  Pairwise Transient key. The
algorithm takesi - pairwise master key(32 bytes), a  char string, the MAC
addresses of client and AP, the nonces provided by client and AP - as the inputs
, and generates 64 byte output. Is anybody aware of the test vectors for this
algorithm ?  The test vector should consist of Pairwise Master Key, client MAC
address, AP Mac address, Client Nonce, AP Nonce. 802.11i draft 7.0 does provide
a test vector but it looks confusing and not much details have been provided..

Please let me know if you are aware of such test vectors?     
   

regards,
alok  
(91) 9848309728



---------------------------------------------------------------------------
Free trial: Astaro Security Linux -- firewall with Spam/Virus Protection

Protect your network with the comprehensive security solution that
integrates six applications for ease of use and lower TCO.

Firewall - Virus protection - Spam protection - URL blocking - VPN
- Wireless security.

Download 30-day evaluation at:
http://www.astaro.com/php/contact/securityfocus.php
----------------------------------------------------------------------------


Current thread: