Thread Links Date Links
Thread Prev Thread Next Thread Index Date Prev Date Next Date Index

[STDS-802-11-TGBT] Question of 11-25/1592



Hi Dan,


Hope all is well. 


We’ve been looking at the 802.11 Authentication frame sequences for PQC PAKE from 11-25/1592r0, and have a question regarding which hash function gets used while computing the PTK (by hKDF). Not sure if we are missing something or if 11-25/1592r2 addresses this.


From the text, it is clear that for exchanges that are related to KEM, when parameters are known, Table 12.X maps the KEM level to the hash function (SHA256/384/512) - this includes PMK caching, OWE replacement, ID privacy exchange, and NOIC Exchange. It is also specified to use SHA-512 for computing the transcript T from the auth frame bodies which are exchanged before KEM parameters for NOIC are. What is the hash function used for computing the PTK - which is specified as -

  PTK = HKDF-expand(HKDF-extract(T, PMK), “IEEE 802.11 PQC PTK Derivation”, PTKLen) ?


This comes after the two exchanges for PQC PAKE that may have different KEM parameters? Should it use the hash function as per NOIC KEM parameter or SHA-512 or something else.


Thanks


-N



To unsubscribe from the STDS-802-11-TGBT list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGBT&A=1

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature