Hash-to-Element (H2E)
An SAE password element method is a cryptographic procedure that
-
Derives the secret password element (PWE) in the Simultaneous Authentication of Equals (SAE) protocol
-
Transforms a password into a secure intermediary element for authentication, and
-
Provides protection against security threats such as group downgrade attacks.
Hash-to-Element is a new SAE Password Element (PWE) calculation method for wireless security protocols.
-
Hash-to-Element (H2E): Hash-to-Element is a SAE password element method that derives the PWE directly from a password using a hashing process. When a station (STA) supporting H2E initiates SAE with an AP, it checks if the AP supports H2E. If supported, the AP uses the H2E method to generate the PWE, as indicated by a new Status Code in the SAE Commit message.
PWE derivation steps in H2E
When using the H2E method, PWE derivation consists of two steps:
-
Creation of secret intermediary element (PT): The secret intermediary element (PT) is derived offline from the password when it is initially configured for each supported group.
-
Derivation of the PWE: The PWE is generated in real-time from the stored PT during the SAE exchange, using the negotiated group and the Media Access Control (MAC) addresses of both peers.
Additional reference information
-
If a device uses the older Hunting-and-Pecking method, the overall SAE exchange remains unchanged.
-
The H2E method protects against man-in-the-middle attacks, including Group Downgrade attacks. During authentication, peers exchange lists of rejected groups as part of PMK derivation. If there is a mismatch, the system terminates authentication to prevent a downgrade attack.
-
In a typical SAE exchange on a 6 GHz network, only the H2E method is used for password element generation.
-
A station using H2E checks AP support, and if supported, uses H2E for secure and efficient authentication.

Feedback