| Thread Links | Date Links | ||||
|---|---|---|---|---|---|
| Thread Prev | Thread Next | Thread Index | Date Prev | Date Next | Date Index |
Hi Hui Please see below From: Hui.Luo@xxxxxxxxxxxx [mailto:Hui.Luo@xxxxxxxxxxxx] Hi Solomon, Thanks for responding quickly! Please see my comments below --- “PMK = PSK is certainly a method, but “some parameters” could be more general. This was originally proposed by Rojan in 11-25/0819” Actually, the PBKDF is used to derive the PMK from the password, which is substantially shorter than the PSK. But in any case, what is the computation method for the mentioned PBKDF? We have not got into details on how to generate PMK from PSK. That would need a consensus in the future. That’s why “some parameters for generating a PMK from PSK” is used in current text. [ST] I think it is not only about the parameters, it is also about the computation method “Data will be encrypted by an AEAD cipher using TK as the key. The AAD of the AEAD cipher includes all fields that need protection plus SNonce. MIC is generated by the AEAD cipher.” I think it shall be clarified in the sentence. Sure, I will improve the clarify of current text (copied below), which should have covered the above idea but I will take a look again. a. If there are uplink data pending for encrypted transmission, the non-AP AMP STA sends the SNonce, the encrypted uplink data, and a MIC to the AMP AP in the first uplink AMP frame, where the [ST] encryption and the MIC is generated by an AEAD cipher using the TK as the key with the SNonce included in the AAD [ST] [ST] Please see my editing. There is still a question whether some protection parameters shall be present in the protection header Best regards, Hui From: Solomon Trainin <solomon.trainin1@xxxxxxxxx>
Hi, Hui! Thanks for your prompt response. Below are some more thoughts related to this topic. “PMK = PSK is certainly a method, but “some parameters” could be more general. This was originally proposed by Rojan in 11-25/0819” Actually, the PBKDF is used to derive the PMK from the password, which is substantially shorter than the PSK. But in any case, what is the computation method for the mentioned PBKDF? “Data will be encrypted by an AEAD cipher using TK as the key. The AAD of the AEAD cipher includes all fields that need protection plus SNonce. MIC is generated by the AEAD cipher.” I think it shall be clarified in the sentence. Best Regards, Solomon Trainin +972547885738 From: Hui.Luo@xxxxxxxxxxxx [mailto:Hui.Luo@xxxxxxxxxxxx] Hi Solomon, Thanks for sharing your comments! Please see my replies next to your comments in the attached document. Best regards, Hui From: Solomon Trainin <solomon.trainin1@xxxxxxxxx>
Hi Hui, I have a few questions regarding your PDT. Please see in the attachment. Best Regards, Solomon Trainin +972547885738
To unsubscribe from the STDS-802-11-TGBP list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGBP&A=1 To unsubscribe from the STDS-802-11-TGBP list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGBP&A=1 |