----- Original Message ----- 
  
  
  Sent: Wednesday, July 21, 2004 9:12 
  PM
  Subject: [STDS-802-16] [Àüüȸ½Å] 
  [STDS-802-16] Cleaning up 802.16e security
  
  Hi, DJ and all. 
  I would like to comment on the approaches of PKMv2 to upgrade 
  the current PKMv1. 
  In my opinion, when we upgrade or revise the currently fixed 
  specifications, we shall provide the backward compatibility to the older one. 
  Even in the case of backward compatibility cannot be fully supported, we 
  should clearly resolve the known problems in the current specification by 
  maximizing the reusability of the current one. But, the PKMv2 overlooked these 
  issues.
  Currently proposed PKMv2 is a new and separate PKM protocol 
  with PKMv1. The Key hierarchy (C802.16e-188r2) is different with that of PKMv1 
  (It is more systematically designed and conceptually better than the older 
  one, but it is not compatible with that). The Key lengths are different and 
  the input parameters are different, even if to the same algorithms: 
  -       PKMv1 AK = 160 bits, 
  PKMv2 AK = 128 bits; 
-       PKMv1 & PKMv2 HMAC Key 
  Derivation Function is different, even though the SHA-1 algorithm is used to 
  both, and its key length (160 vs. 128) and input parameters too. 
  And the PKMv2 uses the newly defined AES_Key_Wrap for 
  transferring keys as mandatory feature for PKMv2 (In session #32, the 
  AES_Key_Wrap was accepted already. But, I hope it will to be modified to 
  include the older key transferring mechanisms).
  Anyway, we can say the current PKMv2 (and its key hierarchy 
  (188r2)) is not backward compatible with PKMv1. And it is not fully supported 
  one of the most important goals and  requirements of the PKMv2 - "It 
  should be backward compatible with the existing PKMv1." (See Ad Hoc documents: 
  Jeff Mandin, "PKMv2 - Goals and Requirements"; David Johnston, "A New PKM for 
  802.16")
    
As you know, TGe PAR (IEEE 
  802.16-02/48r4, approved in 2002-12-11, and the only valid one) state that the 
  following two types of interoperability (or backward compatibility) should be 
  supported: "Subscriber stations specified herein, within stationary, shall 
  interoperate with base stations in IEEE Std 802.16a. Base stations specified 
  herein shall interoperate with stationary subscriber stations specified in 
  IEEE Std 802.16a." The exact meaning of IEEE Std 802.16a should be interpreted 
  as IEEE Std 802.16-2004.
  On the basis of that PAR statement, the TGe-based MSS, when 
  stationary, shall be interoperable with the TGd-based BSs (supporting PKMv1 
  only), but the PKMv2 is not backward compatible with PKMv1 so that the 
  requirements are not fulfilled. And the TGd-based BS shall interoperate with 
  the TGd-based SS (supporting PKMv1 only), but when the TGe-based BS cannot 
  provide the PKMv1 capability, the requirements are not satisfied, too. 
  
  Therefore, in order to provide the backward compatibility 
  (and/or interoperability) with TGd, the TGe-based MSSs and BSs shall provide 
  both of the PKMv1 and PKMv2 capabilities. It is a too much burden and the 
  duplicated functionality to the MSSs.  
  Generally speaking, I hope that the PKMv2 should support the 
  various possibilities of authorization and encryption modes as a superset of 
  including PKMv1 concepts. 
  Fortunately, DJ proposed and showed me the modified Key 
  hierarchy mechanism (188r3) to mitigate our uneasiness by introducing the HMAC 
  SHA-1 key generation, and modified to change the proposal to allow EAP-only 
  mode. We have been reviewing the proposal and we would like to propose an 
  alternative by slightly change the DJ's proposal to maximize the backward 
  compatible and reusable features with PKMv1. By doing that, we can reduce the 
  overhead of implementing the two completely different mechanisms in each 
  Mobile subscriber station, and will get a soft-landing from PKMv1 to 
  PKMv2.
  Sincerely, 
  Chulsik Yoon, 
Senior Engineer, 
  ETRI 
  P.S. 
  I would like to mention the data encryption issue of PKMv2, 
  not relating to the Key hierarchy issue. 
  In PKMv2, we have generally agreed on using the AES algorithm 
  for key management and data encryption. So, in my thought, if we select the 
  PKMv2 based key management methodology, then we will also use the AES 
  algorithm (not the DES algorithm) for data encryption. In the current 
  specification, only the AES-CCM mode can be provided to data encryption using 
  AES algorithm. Even thought, the AES-CCM can provide the high security 
  capabilities by using the Counter and Message Integrity Check with AES, it 
  needs a large amount of overhead (total 12 bytes of overhead per PDU; 4 bytes 
  PN and 8 bytes of Cypertext ICV). In my opinion, most of the user service 
  needs not this type of highly secure mechanisms, except the monetary 
  transactions such as internet banking, mobile commerce, etc. Therefore, the 
  another AES mode (not CCM), not having too much overhead for data encryption 
  transaction, need to be added to the current security mechanisms in IEEE 
  802.16 specifications. 
  Thank You. 
  ¿øº» ³»¿ë: 
  º¸³½»ç¶÷: 
  owner-stds-802-16@listserv.ieee.org[dj.johnston@INTEL.COM] 
¹Þ´Â»ç¶÷: STDS-802-16@listserv.ieee.org 
Á¦¸ñ: 
  [STDS-802-16] Cleaning up 802.16e security 
¹ÞÀº³¯Â¥: 
  2004/07/17 Åä 12:15 
  All, 
I think the input to the security 
  work went rather well. We got most of the underlying mechanisms in the spec. 
  Compare this with the time it took 802.11i to get to this stage. Of course we 
  had the benefit of their hindsight.
  As some of us discussed in the meeting, there are a few things 
  to be done with the security work but also there seems to be agreement that we 
  need to identify and limit the list of things we need to do, in order to bring 
  the work to a close.
  My list of things to be done is as follows: 
    EAP Key agreement 
    Generic Management Frame Protection 
    PKMv2 Key Hierarchy 
    PKMv2 Security State Machines 
    Test Vectors (for the crypto algorithms operating 
  over packets) 
    Vulnerability 
  analysis/corrections 
    General clean 
  up of the contributions that were accepted (we have LB14c for that) 
  
I have vague memories of Jeff having another item for this 
  list but its leaked from my head. 
I will try to 
  coordinate a consensus position on what the key heirarchy should be. So I'd 
  appreciate comment on it. Particularly from anyone who disliked the current 
  proposal enough to vote against it. I don't think the discussion in the 
  meeting shed much light on what the concerns were, since I still don't 
  know.
  EAP Key agreement is in a similar situation. Jeff provided 
  text, but it didn't pass. Therefore any input on what is needed to make it 
  pass is welcome.
  Anyone who can commit to filling in other parts of the 
  framework should declare their interest, so people interested in contributing 
  to the same areas can compare notes.
  Hopefully we can reach some sort of consensus before the next 
  meeting. 
Regards, 
DJ