EAP Grammar
EAP grammar refers to the way EAP is spoken among the components that want to use the authentication and key management services provided by EAP. EAP's grammar is quite simple and consists of the following four primitives:
- Request The authenticator sends these types of packets to the supplicant.
- Response The supplicant sends these types of packets to the authenticator.
- Success These are used to indicate successful authentication.
- Failure These are used to indicate an unsuccessful authentication.
In this tutorial:
- Securing Wireless Networks
- Security Background
- Security Services
- Cryptographic Concepts and Terms
- Encryption and Decryption
- Keyspace
- Exclusive OR (XOR)
- Algorithm
- Asymmetric Encryption Algorithms
- Public-Private Key Cryptography
- Cipher
- Concealment Ciphers vs. Running Key Ciphers
- Stream Ciphers vs. Block Ciphers
- Cipher Examples
- Cipher Implementations
- Wi-Fi Protected Access
- TKIP/WPA
- Wi-Fi Protected Access 2 (WPA2)
- CCMP/AES
- Hash Functions
- EAP
- EAP Entities
- EAP Grammar
- EAP Types
- EAP-TTLS
- EAP-PSK
- EAP-SIM
- EAP-AKA
- IEEE 802.11i
- Four-Way Handshake
- IEEE 802.11i Considerations