Keying Material

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 987 Experts worldwide ranked by ideXlab platform

Joseph Salowey - One of the best experts on this subject based on the ideXlab platform.

  • Cisco Vendor-Specific RADIUS Attributes for the Delivery of Keying Material
    2011
    Co-Authors: Glen Zorn, Tiebing Zhang, Jesse Walker, Joseph Salowey
    Abstract:

    This document defines a set of vendor specific RADIUS Attributes designed to allow both the secure transmission of cryptographic Keying Material and strong authentication of any RADIUS message. This attributes have been allocated from the Cisco vendor specific space and have been implemented by multiple vendors.

  • Cisco Vendor-Specific RADIUS Attributes for the Delivery of Keying Material
    2011
    Co-Authors: Glen Zorn, Tiebing Zhang, Jesse Walker, Joseph Salowey
    Abstract:

    This document defines a set of vendor-specific RADIUS Attributes designed to allow both the secure transmission of cryptographic Keying Material and strong authentication of any RADIUS message. These attributes have been allocated from the Cisco vendor-specific space and have been implemented by multiple vendors. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This is a contribution to the RFC Series, independently of any other RFC stream. The RFC Editor has chosen to publish this document at its discretion and makes no statement about its value for implementation or deployment. Documents approved for publication by the RFC Editor are not a candidate for any level of Internet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained a

Eric Rescorla - One of the best experts on this subject based on the ideXlab platform.

Glen Zorn - One of the best experts on this subject based on the ideXlab platform.

  • Cisco Vendor-Specific RADIUS Attributes for the Delivery of Keying Material
    2011
    Co-Authors: Glen Zorn, Tiebing Zhang, Jesse Walker, Joseph Salowey
    Abstract:

    This document defines a set of vendor specific RADIUS Attributes designed to allow both the secure transmission of cryptographic Keying Material and strong authentication of any RADIUS message. This attributes have been allocated from the Cisco vendor specific space and have been implemented by multiple vendors.

  • Cisco Vendor-Specific RADIUS Attributes for the Delivery of Keying Material
    2011
    Co-Authors: Glen Zorn, Tiebing Zhang, Jesse Walker, Joseph Salowey
    Abstract:

    This document defines a set of vendor-specific RADIUS Attributes designed to allow both the secure transmission of cryptographic Keying Material and strong authentication of any RADIUS message. These attributes have been allocated from the Cisco vendor-specific space and have been implemented by multiple vendors. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This is a contribution to the RFC Series, independently of any other RFC stream. The RFC Editor has chosen to publish this document at its discretion and makes no statement about its value for implementation or deployment. Documents approved for publication by the RFC Editor are not a candidate for any level of Internet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained a

Leonid Reyzin - One of the best experts on this subject based on the ideXlab platform.

  • fuzzy extractors how to generate strong keys from biometrics and other noisy data
    arXiv: Cryptography and Security, 2006
    Co-Authors: Rafail Ostrovsky, Leonid Reyzin
    Abstract:

    We provide formal definitions and efficient secure techniques for - turning noisy information into keys usable for any cryptographic application, and, in particular, - reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any Keying Material that, unlike traditional cryptographic keys, is (1) not reproducible precisely and (2) not distributed uniformly. We propose two primitives: a "fuzzy extractor" reliably extracts nearly uniform randomness R from its input; the extraction is error-tolerant in the sense that R will be the same even if the input changes, as long as it remains reasonably close to the original. Thus, R can be used as a key in a cryptographic application. A "secure sketch" produces public information about its input w that does not reveal w, and yet allows exact recovery of w given another value that is close to w. Thus, it can be used to reliably reproduce error-prone biometric inputs without incurring the security risk inherent in storing them. We define the primitives to be both formally secure and versatile, generalizing much prior work. In addition, we provide nearly optimal constructions of both primitives for various measures of ``closeness'' of input data, such as Hamming distance, edit distance, and set difference.

  • fuzzy extractors how to generate strong keys from biometrics and other noisy data
    Lecture Notes in Computer Science, 2004
    Co-Authors: Leonid Reyzin
    Abstract:

    We provide formal definitions and efficient secure techniques for - turning biometric information into keys usable for any cryptographic application, and - reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any Keying Material that, unlike traditional cryptographic keys, is (1) not reproducible precisely and (2) not distributed uniformly. We propose two primitives: a fuzzy extractor extracts nearly uniform randomness R from its biometric input; the extraction is error-tolerant in the sense that R will be the same even if the input changes, as long as it remains reasonably close to the original. Thus, R can be used as a key in any cryptographic application. A secure sketch produces public information about its biometric input w that does not reveal w, and yet allows exact recovery of w given another value that is close to w. Thus, it can be used to reliably reproduce error-prone biometric inputs without incurring the security risk inherent in storing them. In addition to formally introducing our new primitives, we provide nearly optimal constructions of both primitives for various measures of closeness of input data, such as Hamming distance, edit distance, and set difference.

Tiebing Zhang - One of the best experts on this subject based on the ideXlab platform.

  • Cisco Vendor-Specific RADIUS Attributes for the Delivery of Keying Material
    2011
    Co-Authors: Glen Zorn, Tiebing Zhang, Jesse Walker, Joseph Salowey
    Abstract:

    This document defines a set of vendor specific RADIUS Attributes designed to allow both the secure transmission of cryptographic Keying Material and strong authentication of any RADIUS message. This attributes have been allocated from the Cisco vendor specific space and have been implemented by multiple vendors.

  • Cisco Vendor-Specific RADIUS Attributes for the Delivery of Keying Material
    2011
    Co-Authors: Glen Zorn, Tiebing Zhang, Jesse Walker, Joseph Salowey
    Abstract:

    This document defines a set of vendor-specific RADIUS Attributes designed to allow both the secure transmission of cryptographic Keying Material and strong authentication of any RADIUS message. These attributes have been allocated from the Cisco vendor-specific space and have been implemented by multiple vendors. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This is a contribution to the RFC Series, independently of any other RFC stream. The RFC Editor has chosen to publish this document at its discretion and makes no statement about its value for implementation or deployment. Documents approved for publication by the RFC Editor are not a candidate for any level of Internet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained a