174:(MPDU) comprises five sections. The first is the MAC header which contains the destination and source address of the data packet. The second is the CCMP header which is composed of 8 octets and consists of the packet number (PN), the Ext IV, and the key ID. The packet number is a 48-bit number stored across 6 octets. The PN codes are the first two and last four octets of the CCMP header and are incremented for each subsequent packet. Between the PN codes are a reserved octet and a Key ID octet. The Key ID octet contains the Ext IV (bit 5), Key ID (bits 6โ7), and a reserved subfield (bits 0โ4). CCMP uses these values to encrypt the data unit and the MIC. The third section is the data unit which is the data being sent in the packet. The fourth is the
90:
155:
data field and selected portions of the IEEE 802.11 MPDU header. CCMP is based on AES processing and uses a 128-bit key and a 128-bit block size. CCMP uses CCM with the following two parameters:
108:
64:
standard. CCMP is an enhanced data cryptographic encapsulation mechanism designed for data confidentiality and based upon the
Counter Mode with CBC-MAC (
303:
262:
126:
348:
199:
144:
220:
Because CCMP is a block cipher mode using a 128-bit key, it is secure against attacks to the 2 steps of operation. Generic
363:
353:
237:
69:
175:
182:(FCS) which is used for error detection and correction. Of these sections only the data unit and MIC are encrypted.
221:
191:
195:
73:
368:
203:
171:
152:
358:
179:
269:
268:. New York, New York: The Institute of Electrical and Electronics Engineers, Inc. Archived from
299:
160:
49:
178:(MIC) which protects the integrity and authenticity of the packet. Finally, the fifth is the
342:
57:
53:
224:
do exist and can be used to limit the theoretical strength of the key to 2 (where
17:
210:
Data confidentiality; ensures only authorized parties can access the information
61:
46:
72:(AES) standard. It was created to address the vulnerabilities presented by
151:
for authentication and integrity. CCM protects the integrity of both the
140:
65:
148:
31:
Counter Mode Cipher Block
Chaining Message Authentication Code Protocol
320:
298:(3 ed.). Boston, MA: Course Technology. pp. 205, 380, 381.
83:
149:
cipher block chaining message authentication code (CBC-MAC)
190:
CCMP is the standard encryption protocol for use with the
319:
Whiting, Doug; R. Housley; N. Ferguson (September 2003).
213:
Authentication; provides proof of genuineness of the user
104:
206:(WPA). CCMP provides the following security services:
228:
is the number of bits in the key) operations needed.
166:
L = 2; indicating that the Length field is 2 octets.
216:
Access control in conjunction with layer management
99:
may be too technical for most readers to understand
238:Advanced Encryption Standard ยง Known attacks
194:(WPA2) standard and is much more secure than the
296:Security Guide To Network Security Fundamentals
56:products that implements the standards of the
256:
254:
252:
8:
127:Learn how and when to remove this message
111:, without removing the technical details.
172:Medium Access Control Protocol Data Unit
248:
109:make it understandable to non-experts
7:
159:M = 8; indicating that the MIC is 8
27:Encryption protocol for Wireless LAN
76:(WEP), a dated, insecure protocol.
25:
88:
200:Temporal Key Integrity Protocol
1:
147:for data confidentiality and
35:Counter Mode CBC-MAC Protocol
321:"Counter with CBC-MAC (CCM)"
261:Cole, Terry (12 June 2007).
70:Advanced Encryption Standard
385:
235:
222:meet-in-the-middle attacks
60:amendment to the original
192:Wi-Fi Protected Access II
196:Wired Equivalent Privacy
74:Wired Equivalent Privacy
349:Cryptographic protocols
323:. The Internet Society
263:"IEEE Std 802.11-2007"
204:Wi-Fi Protected Access
176:message integrity code
294:Ciampa, Mark (2009).
364:Secure communication
180:frame check sequence
354:Wireless networking
275:on October 13, 2008
198:(WEP) protocol and
305:978-1-4283-4066-4
137:
136:
129:
80:Technical details
39:CCM mode Protocol
18:CCMP (Encryption)
16:(Redirected from
376:
333:
332:
330:
328:
316:
310:
309:
291:
285:
284:
282:
280:
274:
267:
258:
132:
125:
121:
118:
112:
92:
91:
84:
21:
384:
383:
379:
378:
377:
375:
374:
373:
339:
338:
337:
336:
326:
324:
318:
317:
313:
306:
293:
292:
288:
278:
276:
272:
265:
260:
259:
250:
245:
240:
234:
188:
133:
122:
116:
113:
105:help improve it
102:
93:
89:
82:
28:
23:
22:
15:
12:
11:
5:
382:
380:
372:
371:
369:Key management
366:
361:
356:
351:
341:
340:
335:
334:
311:
304:
286:
247:
246:
244:
241:
236:Main article:
233:
230:
218:
217:
214:
211:
187:
184:
168:
167:
164:
163:(eight bytes).
143:that combines
135:
134:
96:
94:
87:
81:
78:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
381:
370:
367:
365:
362:
360:
357:
355:
352:
350:
347:
346:
344:
322:
315:
312:
307:
301:
297:
290:
287:
271:
264:
257:
255:
253:
249:
242:
239:
232:Known attacks
231:
229:
227:
223:
215:
212:
209:
208:
207:
205:
201:
197:
193:
185:
183:
181:
177:
173:
165:
162:
158:
157:
156:
154:
150:
146:
142:
131:
128:
120:
117:February 2018
110:
106:
100:
97:This article
95:
86:
85:
79:
77:
75:
71:
67:
63:
59:
55:
52:designed for
51:
48:
44:
40:
36:
32:
19:
325:. Retrieved
314:
295:
289:
277:. Retrieved
270:the original
225:
219:
189:
169:
138:
123:
114:
98:
58:IEEE 802.11i
54:Wireless LAN
42:
38:
34:
30:
29:
359:IEEE 802.11
62:IEEE 802.11
343:Categories
243:References
202:(TKIP) of
139:CCMP uses
47:encryption
68:) of the
327:11 April
279:11 April
186:Security
145:CTR mode
66:CCM mode
50:protocol
45:) is an
170:A CCMP
103:Please
302:
161:octets
273:(PDF)
266:(PDF)
37:) or
329:2011
300:ISBN
281:2011
153:MPDU
43:CCMP
141:CCM
107:to
345::
251:^
331:.
308:.
283:.
226:n
130:)
124:(
119:)
115:(
101:.
41:(
33:(
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.