Publication | Closed Access
Protected EAP Protocol (PEAP) Version 2
77
Citations
0
References
2004
Year
Unknown Venue
Multiple Eap MechanismsLightweight Authentication MechanismAuthentication AuthorizationEngineeringInformation SecurityTrusted Execution EnvironmentExtensible Authentication ProtocolEap Authentication MechanismsEap ProtocolSecure ProtocolAuthentication ProtocolAuthentication Access ControlData SecurityCryptography
The Extensible Authentication Protocol (EAP) provides for support of multiple authentication methods. This document defines the Protected Extensible Authentication Protocol (PEAP) Version 2, which provides an encrypted and authenticated tunnel based on transport layer security (TLS) that encapsulates EAP authentication mechanisms. PEAPv2 uses TLS to protect against rogue authenticators, protect against various attacks on the confidentiality and integrity of the inner EAP method exchange and provide EAP peer identity privacy. PEAPv2 also provides support for chaining multiple EAP mechanisms, cryptographic binding between authentications performed by inner EAP mechanisms and the tunnel, exchange of arbitrary parameters (TLVs), optimized session resumption, and fragmentation and reassembly.