The image is taken from https://mrncciew.com/2014/08/19/cwsp-4-way-handshake/ . How does it transmit the keys without session establishment in untrusted medium. Is it that after EAP is successful, authenticator sends the MSK to supplicant transparently that it received from authentication server? Also I have follow up question, based on the following diagram, how MSK is derived for WPA-PSK (Personal authentication) environment? [link] [comments] |
from hacking: security in practice https://ift.tt/pNoTSdr
Comments
Post a Comment