Clarified CCM Diagrams

Slides:



Advertisements
Similar presentations
Doc.: IEEE /611r6 Submission December Mark Matson, Broadcom; David Johnston, Mobilian.Slide 1 Improved CCMP PN Usage Mark Matson
Advertisements

“Advanced Encryption Standard” & “Modes of Operation”
CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Doc.: IEEE /770r0 Submission July 2009 Slide 1 TGs Authenticated Encryption Function Date: Authors: Russ Housley (Vigil Security), et.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
Security Implementation Proposal for OpenWSN
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
+======-========-========-========-========-========-========-========-========+ | Bit| 7 | 6 | 5 | 4 | 3 | 2 | 1 | 0 | |Byte | | | | | | | | | |======+=======================================================================|
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
Source Port # (16)Destination Port # (16) Sequence Number (32 bits) Acknowledgement Number (32 bits) Hdr Len (4) Flags (6)Window Size (16) Options (if.
THE USE OF IP ESP TO PROVIDE A MIX OF SECURITY SERVICES IN IP DATAGRAM SREEJITH SREEDHARAN CS843 PROJECT PRESENTATION 04/28/03.
1 Internet Networking Spring 2002 Tutorial 2 IP Checksum, Fragmentation.
Lecture 23 Symmetric Encryption
1 PSAMP Protocol Specifications IPFIX IETF-64 November 10th, 2005 Benoit Claise Juergen Quittek Andrew Johnson.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: On padding method of AES-CBC Date Submitted: January, 17th, 2013 Presented at IEEE.
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
1 July, 2002 doc:.: /275r0 Daniel V. Bailey, Ari Singer, NTRU 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
Doc.: IEEE /1077r0 Submission September 2010 Dan Harkins, Aruba NetworksSlide 1 Galois/Counter Mode (GCM) Date: Authors:
Doc.: IEEE /296r1 SubmissionMitch Buchman May 2001 Slide 1 TGi Draft 1Clause Comments IEEE P802.11E Security/D1.0 Letter Ballot# 25.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Doc.: IEEE Submission November 16, 2004 Poor & Struik / Ember & CerticomSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /0848-r2 Submission July 2006 K.HayesSlide 1 RSC Pools for Mgmt Frames Notice: This document has been prepared to assist IEEE
KeyProv PSKC Specification Philip Hoyer Mingliang Pei Salah Machani 74 nd IETF meeting, San Francisco Nov
Doc.: IEEE /634r1 Submission November 2001 Ferguson, Housley, WhitingSlide 1 AES Mode Choices OCB vs. Counter Mode with CBC-MAC Niels Ferguson,
Doc.: IEEE /0964r0 Submission September 2010 David Halasz, AclaraSlide 1 Smart Grid and Key Lengths Date: Authors:
Doc.: IEEE /XXXXr0 Submission July 2006 Nancy Cam-Winget, Cisco Slide 1 Constructing unique key streams for Management Frame Protection Notice:
af-Secure-Enabelement-and-CVS-without-Association Submission June 2011 Secure Enablement and CVS without Persistent Association Slide 1Qualcomm.
Ken Grewal Gabriel Montenegro Manav Bhatia
Chapter 22 Next Generation IP
IP: Addressing, ARP, Routing
WEP2 Enhancements Russ Housley, RSA Labs Doug Whiting, HiFn
Security Enhancement to FTM
Internet Networking Spring 2002
July 2010 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Bit Order Comment Resolution] Date Submitted:
TGi Motions for Comment Resolution
Motions to Address Some Letter Ballot 52 Comments
AES Mode Choices OCB vs. Counter Mode with CBC-MAC
Summary of Changes to TSPEC (in Document 406r3)
Multicast Replay Detection Fred Stivers, Texas Instruments
RSC Pools for Mgmt Frames
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG SECN Call for Proposals] Date Submitted:
Security for Measurement Requests and Information
Security for Measurement Requests and Information
November 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG SECN Amendment text] Date Submitted:
Multicast Replay Detection Fred Stivers, Texas Instruments
Multicast Replay Detection Fred Stivers, Texas Instruments
Security for Measurement Requests and Information
Net 323 D: Networks Protocols
TKIP Key Mixing Code And Vectors
December 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security considerations for 15.3e] Date.
AES Associated Data Optimization
Multicast Replay Detection Fred Stivers, Texas Instruments
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Clarifying TKIP MIC processing format Fred Stivers, Texas Instruments
EAPOL-Key Clarifications
CCMP MIC Processing Paul Lambert September 2002
July 2010 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Bit Order Comment Resolution] Date Submitted:
Result: Yes - ; No - ; Abstain - .
TGi Draft 1 Clause – 8.5 Comments
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
NET 323D: Networks Protocols
IEs in 4-way handshake description
Counter With Cipher Block Chaining-MAC
Elect. Codebook, Cipher Block Chaining
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
TGi Draft 1 Clause – 8.5 Comments
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Secret-Key Encryption
Presentation transcript:

Clarified CCM Diagrams November. 2002 Clarified CCM Diagrams David Johnston david.johnston@ieee.org David Johnston, Mobilian.

November. 2002 Problem CCM Text in current TGi draft D2.3 fail to adequately describe: data path widths Padding operations Construction of IV and header fields Bit level behaviour of CCM algorithm David Johnston, Mobilian.

November. 2002 Solution Include complete CCM encryption and decryption algorithm data flow diagrams For clarity, break out the construction of the 4 initialization blocks into separate diagrams MIC_IV, first MIC header block MIC_HEADER1, second MIC header block MIC_HEADER2, third MIC header block CTR_PRELOAD(i), encryption and decryption counter nonce David Johnston, Mobilian.

Solution - Continued Correct bit map of CCM ctr flag field November. 2002 Solution - Continued Correct bit map of CCM ctr flag field 00000001 not 01000001 Rename RSN Header bytes in the CCM encapsulation diagram to be names PN0 through to PN5, corresponding to the lsb through to the msb of the PN bytes respectively. Make clear that HLEN is length of muted header Make clear that protected bit is set in IV David Johnston, Mobilian.

November. 2002 Solution – Continued - 2 Provide octet index in tables describing initialization block construction Brings into sync with diagrams in the NIST CCM Specifications. Disambiguates endianess David Johnston, Mobilian.

Concerning 802 MAC Addresses November. 2002 Concerning 802 MAC Addresses 802 Does not specify a MAC address with bits 47-0 There are octets 0-5. Octet 0 is written on the left 00-E0-63-82-8E-77 : Octet: 1 2 3 4 5 Value: 00 E0 63 82 8E 77 Must not use colons! Implies bit reversal within bytes Therefore Avoid colons Refer to octets 0-5 Do not refer to bits 47-0 David Johnston, Mobilian.

Information Represented November. 2002 Information Represented Data Path Widths within CCM algorithm Ordering of bytes within initialization block fields Position of padding operations Unambiguous construction of initialization blocks David Johnston, Mobilian.

CCM Encapsulation Process November. 2002 CCM Encapsulation Process David Johnston, Mobilian.

CCM Decapsulation Process November. 2002 CCM Decapsulation Process David Johnston, Mobilian.

November. 2002 CCM Encapsulation David Johnston, Mobilian.

November. 2002 CTR_PRELOAD(C) David Johnston, Mobilian.

November. 2002 CCM Encryption David Johnston, Mobilian.

CCM Decryption Diagram November. 2002 CCM Decryption Diagram David Johnston, Mobilian.

November. 2002 MIC_IV Diagram David Johnston, Mobilian.

November. 2002 MIC_HEADER1 Diagram David Johnston, Mobilian.

November. 2002 MIC_HEADER2 Diagram David Johnston, Mobilian.

November. 2002 CCM MIC David Johnston, Mobilian.

November. 2002 The Text Document 11-02-611r6 contains text and instructions to the editor to make changes to section 8.3.4 and its subsections. Changes are with respect to D2.5 of TGi spec. David Johnston, Mobilian.

November. 2002 Motion Instruct the editor to incorporate into the draft the changes described in document 11-02-611r6 David Johnston, Mobilian.