Knowledge

CCMP (cryptography)

Source ๐Ÿ“

174:(MPDU) comprises five sections. The first is the MAC header which contains the destination and source address of the data packet. The second is the CCMP header which is composed of 8 octets and consists of the packet number (PN), the Ext IV, and the key ID. The packet number is a 48-bit number stored across 6 octets. The PN codes are the first two and last four octets of the CCMP header and are incremented for each subsequent packet. Between the PN codes are a reserved octet and a Key ID octet. The Key ID octet contains the Ext IV (bit 5), Key ID (bits 6โ€“7), and a reserved subfield (bits 0โ€“4). CCMP uses these values to encrypt the data unit and the MIC. The third section is the data unit which is the data being sent in the packet. The fourth is the 90: 155:
data field and selected portions of the IEEE 802.11 MPDU header. CCMP is based on AES processing and uses a 128-bit key and a 128-bit block size. CCMP uses CCM with the following two parameters:
108: 64:
standard. CCMP is an enhanced data cryptographic encapsulation mechanism designed for data confidentiality and based upon the Counter Mode with CBC-MAC (
303: 262: 126: 348: 199: 144: 220:
Because CCMP is a block cipher mode using a 128-bit key, it is secure against attacks to the 2 steps of operation. Generic
363: 353: 237: 69: 175: 182:(FCS) which is used for error detection and correction. Of these sections only the data unit and MIC are encrypted. 221: 191: 195: 73: 368: 203: 171: 152: 358: 179: 269: 268:. New York, New York: The Institute of Electrical and Electronics Engineers, Inc. Archived from 299: 160: 49: 178:(MIC) which protects the integrity and authenticity of the packet. Finally, the fifth is the 342: 57: 53: 224:
do exist and can be used to limit the theoretical strength of the key to 2 (where
17: 210:
Data confidentiality; ensures only authorized parties can access the information
61: 46: 72:(AES) standard. It was created to address the vulnerabilities presented by 151:
for authentication and integrity. CCM protects the integrity of both the
140: 65: 148: 31:
Counter Mode Cipher Block Chaining Message Authentication Code Protocol
320: 298:(3 ed.). Boston, MA: Course Technology. pp. 205, 380, 381. 83: 149:
cipher block chaining message authentication code (CBC-MAC)
190:
CCMP is the standard encryption protocol for use with the
319:
Whiting, Doug; R. Housley; N. Ferguson (September 2003).
213:
Authentication; provides proof of genuineness of the user
104: 206:(WPA). CCMP provides the following security services: 228:
is the number of bits in the key) operations needed.
166:
L = 2; indicating that the Length field is 2 octets.
216:
Access control in conjunction with layer management
99:
may be too technical for most readers to understand
238:Advanced Encryption Standard ยง Known attacks 194:(WPA2) standard and is much more secure than the 296:Security Guide To Network Security Fundamentals 56:products that implements the standards of the 256: 254: 252: 8: 127:Learn how and when to remove this message 111:, without removing the technical details. 172:Medium Access Control Protocol Data Unit 248: 109:make it understandable to non-experts 7: 159:M = 8; indicating that the MIC is 8 27:Encryption protocol for Wireless LAN 76:(WEP), a dated, insecure protocol. 25: 88: 200:Temporal Key Integrity Protocol 1: 147:for data confidentiality and 35:Counter Mode CBC-MAC Protocol 321:"Counter with CBC-MAC (CCM)" 261:Cole, Terry (12 June 2007). 70:Advanced Encryption Standard 385: 235: 222:meet-in-the-middle attacks 60:amendment to the original 192:Wi-Fi Protected Access II 196:Wired Equivalent Privacy 74:Wired Equivalent Privacy 349:Cryptographic protocols 323:. The Internet Society 263:"IEEE Std 802.11-2007" 204:Wi-Fi Protected Access 176:message integrity code 294:Ciampa, Mark (2009). 364:Secure communication 180:frame check sequence 354:Wireless networking 275:on October 13, 2008 198:(WEP) protocol and 305:978-1-4283-4066-4 137: 136: 129: 80:Technical details 39:CCM mode Protocol 18:CCMP (Encryption) 16:(Redirected from 376: 333: 332: 330: 328: 316: 310: 309: 291: 285: 284: 282: 280: 274: 267: 258: 132: 125: 121: 118: 112: 92: 91: 84: 21: 384: 383: 379: 378: 377: 375: 374: 373: 339: 338: 337: 336: 326: 324: 318: 317: 313: 306: 293: 292: 288: 278: 276: 272: 265: 260: 259: 250: 245: 240: 234: 188: 133: 122: 116: 113: 105:help improve it 102: 93: 89: 82: 28: 23: 22: 15: 12: 11: 5: 382: 380: 372: 371: 369:Key management 366: 361: 356: 351: 341: 340: 335: 334: 311: 304: 286: 247: 246: 244: 241: 236:Main article: 233: 230: 218: 217: 214: 211: 187: 184: 168: 167: 164: 163:(eight bytes). 143:that combines 135: 134: 96: 94: 87: 81: 78: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 381: 370: 367: 365: 362: 360: 357: 355: 352: 350: 347: 346: 344: 322: 315: 312: 307: 301: 297: 290: 287: 271: 264: 257: 255: 253: 249: 242: 239: 232:Known attacks 231: 229: 227: 223: 215: 212: 209: 208: 207: 205: 201: 197: 193: 185: 183: 181: 177: 173: 165: 162: 158: 157: 156: 154: 150: 146: 142: 131: 128: 120: 117:February 2018 110: 106: 100: 97:This article 95: 86: 85: 79: 77: 75: 71: 67: 63: 59: 55: 52:designed for 51: 48: 44: 40: 36: 32: 19: 325:. Retrieved 314: 295: 289: 277:. Retrieved 270:the original 225: 219: 189: 169: 138: 123: 114: 98: 58:IEEE 802.11i 54:Wireless LAN 42: 38: 34: 30: 29: 359:IEEE 802.11 62:IEEE 802.11 343:Categories 243:References 202:(TKIP) of 139:CCMP uses 47:encryption 68:) of the 327:11 April 279:11 April 186:Security 145:CTR mode 66:CCM mode 50:protocol 45:) is an 170:A CCMP 103:Please 302:  161:octets 273:(PDF) 266:(PDF) 37:) or 329:2011 300:ISBN 281:2011 153:MPDU 43:CCMP 141:CCM 107:to 345:: 251:^ 331:. 308:. 283:. 226:n 130:) 124:( 119:) 115:( 101:. 41:( 33:( 20:)

Index

CCMP (Encryption)
encryption
protocol
Wireless LAN
IEEE 802.11i
IEEE 802.11
CCM mode
Advanced Encryption Standard
Wired Equivalent Privacy
help improve it
make it understandable to non-experts
Learn how and when to remove this message
CCM
CTR mode
cipher block chaining message authentication code (CBC-MAC)
MPDU
octets
Medium Access Control Protocol Data Unit
message integrity code
frame check sequence
Wi-Fi Protected Access II
Wired Equivalent Privacy
Temporal Key Integrity Protocol
Wi-Fi Protected Access
meet-in-the-middle attacks
Advanced Encryption Standard ยง Known attacks



"IEEE Std 802.11-2007"

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

โ†‘