July 2002 QoS Interactions Interaction of AES Message Integrity Check Processing with Quality of Service Paul Lambert, Woodside Networks, Inc.

Slides:



Advertisements
Similar presentations
Short MAC Header Date: Authors: John Doe, Some Company
Advertisements

Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
IPSec in a Multi-OS Environment. What is IPSec? IPSec stands for Internet Protocol Security It is at a most basic level a way of adding security to your.
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Doc.: IEEE /0848-r2 Submission July 2006 K.HayesSlide 1 RSC Pools for Mgmt Frames Notice: This document has been prepared to assist IEEE
Issue EAPoL-Key message generation at WTP or AC Issue 199, summarized as:...the WTP maintains the KeyRSC while the AC requires this information to.
af-Secure-Enabelement-and-CVS-without-Association Submission June 2011 Secure Enablement and CVS without Persistent Association Slide 1Qualcomm.
IP Security
Message Authentication Code
CSE 4905 WiFi Security II WPA2 (WiFi Protected Access 2)
IPSec Detailed Description and VPN
IPSecurity.
EA C451 (Internetworking Technologies)
WEP2 Enhancements Russ Housley, RSA Labs Doug Whiting, HiFn
CSE 4905 IPsec.
Bruno Saba DCT/TV/IN 26/04/2010
Chapter 18 IP Security  IP Security (IPSec)
How Updated CCSDS Protocols can Simplify Data Formatting for the Constellation Project Ed Greenberg Greg Kazz.
IPSec IPSec is communication security provided at the network layer.
Simplifying Implementation of CCMP Mode
Groupcast discussion Date: Authors: Mar 2009 Month Year
Martin Lefkowitz Trapeze Networks
Virtual Private Networks (VPNs)
RSC Pools for Mgmt Frames
RSC Pools for Mgmt Frames
Ack Bitmap length for Burst ACK
November 18, 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security Resolutions] Date Submitted:
Secure WUR frames Date: Authors: January 2018
Stefan Rommer, Mats Näslund, András Méhes (Ericsson)
Broadcast and Unicast Management Protection (BUMP)
WAVE ITS Station Technical Capabilities Summary
CID: 4551, LB84, Section 6.1.5, Figure 18 Authors: May 2006
Beacon Protection Date: Authors: July 2018 July 2018
Beacon Protection Date: Authors: May 2018 January 2018
Security for Measurement Requests and Information
Security for Measurement Requests and Information
Security for Measurement Requests and Information
AES Associated Data Optimization
Recommendations for Non-Cognitive Related Security Functions in
Discussion Points for Joint TGe and TGi
July 2008 doc.: IEEE /0833r0 July 2008 A Proposed Scale-down Solution to A-MPDU DoS Related Comments in LB 129 Date: Authors: Luke.
A Simplified Solution For Critical A-MPDU DoS Issues
doc.: IEEE /454r0 Bob Beach Symbol Technologies
Virtual Private Networks (VPNs)
Rekeying Protocol Fix Date: Authors: Month Year
CCMP MIC Processing Paul Lambert September 2002
Section 6.1.5, Figure 18 Authors: May 2006 Date: Month Year
A Simplified Solution For Critical A-MPDU DoS Issues
Responses to Clause 5 Comments
Beacon Protection Date: Authors: July 2018 July 2018
MAC Design Considerations for LC PAR
November 16, 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security Resolutions] Date Submitted:
Sharp Laboratories USA
Overview of Improvements to Key Holder Protocols
Beacon Protection Date: Authors: May 2018 January 2018
TGi Draft 1 Clause – 8.5 Comments
Overview of Improvements to Key Holder Protocols
Naval Research Laboratory Dynamic Backbone Subnets
A Better Way to Protect APE Messages
Counter With Cipher Block Chaining-MAC
Review of n A-MPDU DoS Issues – Progress and Status
TGi Draft 1 Clause – 8.5 Comments
Reducing Overhead in Active Scanning
July 2008 doc.: IEEE /0833r0 July 2008 A Proposed Scale-down Solution to A-MPDU DoS Related Comments in LB 129 Date: Authors: Luke.
Multi-Link Architecture and Requirement Discussion
CSE 5/7349 – February 15th 2006 IPSec.
Multi-Link Architecture and Requirement Discussion
Presentation transcript:

July 2002 QoS Interactions Interaction of AES Message Integrity Check Processing with Quality of Service Paul Lambert, Woodside Networks, Inc.

July 2002 Overview AES encryption modes provide integrity protection of portions of the MAC header 2.2 draft and other AES proposals protect different header fields and include different information in the ‘nonce’ QoS processing has impact on nonce and integrity processing This proposal recommends necessary requirements for nonce and integrity processing Paul Lambert, Woodside Networks, Inc.

Nonce Processing Nonce / key pair must be unique July 2002 Nonce Processing Nonce / key pair must be unique Nonce includes Replay Counter (a.k.a. Packet Number) QoS processing requires unique replay counter per transmit side QoS-TCID To prevent duplication of nonce/key pair the QoS-TCID must be included in the nonce! Paul Lambert, Woodside Networks, Inc.

July 2002 Replay Counter Individual replay counters must be supported per QoS Traffic Class QoS operation would delay some packets making window size for a single counter indeterminate Checking monotonicity of a single transmit counter limits window size to one (Russ’s proposal) So … Replay counters per QoS Traffic Class must be supported (already in draft) Paul Lambert, Woodside Networks, Inc.

MIC’ing the Sequence Number and QoS July 2002 MIC’ing the Sequence Number and QoS 11-02-144r1 (aka CCM) proposed inclusion of Sequence Control field in AES MIC Sequence Number (in Sequence Control) is sequential over-the-air QoS scheduling makes the order of transmission indeterminate So … Sequence Number can not be added until packets are pulled of QoS queues for transmission Paul Lambert, Woodside Networks, Inc.

No MIC on Sequence Number with QoS July 2002 No MIC on Sequence Number with QoS With the Sequence Number put on just before transmission, a message integrity check would have to put on just prior to transmission Low latency requirements for QoS transmission prevent just-in-time encryption Encryption processing must allow encrypted packets to be placed in QoS queues Sequence number can NOT be part of message integrity Very important to not include SN to support QoS and software implementations Paul Lambert, Woodside Networks, Inc.

MIC and Nonce Summary QoS-TCID must be included in AES Nonce July 2002 MIC and Nonce Summary QoS-TCID must be included in AES Nonce Replay counter / Packet Number counter is unique per transmit QoS Traffic Class The Sequence Number Field should NOT be included in the MIC calculation Paul Lambert, Woodside Networks, Inc.

Unicast Replay Verification July 2002 Unicast Replay Verification Current draft (2.2 section 8.3.1.3.4.11) defines replay processing with STA counters being odd and AP counters being even. This will not work for iBSS This is not necessary for nonce uniqueness since the SA is already included Paul Lambert, Woodside Networks, Inc.

AES/WRAP Unicast Replay-Counter Processing July 2002 AES/WRAP Unicast Replay-Counter Processing WRAP replay counter processing shall provide a unique counter per QoS traffic class Current limitations on counter (odd-even increments) shall be removed and replaced with unique counters that increment by one. Paul Lambert, Woodside Networks, Inc.

WRAP Layering in 802.11 MAC July 2002 MSDU Fragmentation WRAP Processing Replay Counter Replay Counter Replay Counter QoS Queues MPDU MPDU MPDU MPDU MPDU Transmit Sequence Counter Paul Lambert, Woodside Networks, Inc.