Critical analysis of counter mode with cipher block chain message authentication mode protocol - CCMP

نویسندگان

  • Idris Ahmed
  • Anne James
  • Dhananjay Singh
چکیده

CCM/CCMP is a two-cycle authenticate and encrypt (AE) mode. One cycle is used to perform confidentiality computations, and the second cycle is used to compute authenticity and integrity. CCM/CCMP is also a generic composition. CCM/CCMP is actually made up of two separate modes, CBC-MAC and AES counter mode amalgamated together. Although CCM/CCMP is an AE mode, it is not an authenticated encryption with associated data (AEAD) mode. Previous research has suggested that it is a major deficiency for an AEmode not to be anAEAD. Previous critiques of the CCM/CCMP have shown that CBC-MAC and AES counter mode were poorly amalgamated to create the CCM/CCMP. They also showed that CCMP, which was ratified by the IEEE 802.11i workgroup in 2003 and implemented inWPA2, has some security issues. It also has somemajor efficiency and complexity issues. This research work reviewed the current major AE and AEADmodes such as the Galois counter mode, and the encryption systemwith keyed integrity andmanaged oracle and used critical analysis and statistical analysis approaches to identify more deficiencies in the CCM/CCMP. Copyright © 2013 John Wiley & Sons, Ltd.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Resource Saving AES-CCMP Design with Hybrid Counter Mode Block Chaining - MAC

IEEE 802.11i security standard is emerging as an essential security requirement to support the growth of a wide range of wireless data services and applications. However, with the advent of more battery powered wireless devices, efficient and robust cryptographic designs are needed that do not impose high computational overhead and avoid mismatch with limited battery resources and low processin...

متن کامل

CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA

Corresponding Author: Velayutham, R. Einstein College of Engineering, Tirunelveli, Tamilnadu, India Email: [email protected] Abstract: The comparative analysis of the renowned cryptographic algorithms AES, DES and RSA. The Rijndael algorithm was adapted as Advanced Encryption Standard (AES) algorithm, to Data Encryption algorithm (DES), which have been in the security standards since lon...

متن کامل

Robust and Low Latency Security Framework for Ieee 802.11 Wireless Networks by Muhammad Junaid

Wireless Networks call for enhanced confidentiality, integrity and authentication services because of their inherent weakness. 'Counter Mode Cipher Block Chaining Message Authentication Code Protocol' (CCMP) has recently been employed to replace flawed 'Wired Equivalent Privacy' (WEP) Protocol for the provision of security to IEEE 802.11 wireless local area networks (WLAN). Meanwhile, IEEE 802....

متن کامل

Modes of Operation for Camellia for Use with IPsec

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document describes the use ...

متن کامل

The conventions for using the Advanced Encryption Standard-Counter with Cipher Block Chaining-Message Authentication Code (AES-CCM) and the AES-Galois/Counter Mode (GCM) authenticated encryption algorithms

This document describes an additional content type for the Cryptographic Message Syntax (CMS) [CMS]. The authenticatedenveloped-data content type is intended for use with authenticated encryption modes, where an arbitrary content is both authenticated and encrypted. Also, some associated data in the form of authenticated attributes can also be authenticated. All of the various key management te...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Security and Communication Networks

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2014