December 2015 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security considerations for 15.3e] Date.

Slides:



Advertisements
Similar presentations
Doc.: IEEE e Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security.
Advertisements

Submission Title: [Add name of submission]
November 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [AES-256 for ] Date Submitted:
June 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposed Scenarios for Usage Model Document.
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Add name of submission] Date Submitted:
doc.: IEEE <doc#>
October 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [AES-256 for ] Date Submitted: [17.
doc.: IEEE <doc#>
October 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [AES-256 for ] Date Submitted: [17.
doc.: IEEE <doc#>
doc.: IEEE <doc#>
doc.: IEEE <doc#>
Submission Title: [Multi-band OFDM Proposal References]
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Considerations on general MAC frame] Date Submitted:
<month year> <doc.: IEEE doc> January 2013
doc.: IEEE <doc#>
<January 2002> doc.: IEEE <02/139r0> May, 2008
doc.: IEEE <doc#>
January 2016 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security for HRCP] Date Submitted: [18.
December 2, 2018 doc.: IEEE r0 May, 2004
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG SECN Call for Proposals] Date Submitted:
doc.: IEEE <doc#>
doc.: IEEE <doc#>
doc.: IEEE <doc#>
<month year> doc.: IEEE <xyz> January 2001
doc.: IEEE <doc#>
doc.: IEEE <doc#>
<month year> doc.: IEEE < e> <September 2010>
January 16, 2019 doc.: IEEE r0 September, 2004
January 2016 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security for HRCP] Date Submitted: [18.
doc.: IEEE <doc#>
Jan Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Proposed change of terminology: frame to superframe.
doc.: IEEE <doc#>
November 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Text Proposal for FCC NPRM Response Date.
Submission Title: [WG WNG Liaison Report January08]
<month year> <doc.: IEEE doc> December 2015
<month year> <doc.: IEEE doc> July 2014
doc.: IEEE <doc#>
<month year> <doc.: IEEE doc> March 2015
<month year> doc.: IEEE <xyz> November 2000
doc.: IEEE <doc#>
doc.: IEEE /XXXr0 Sep 19, 2007 June 2009
doc.: IEEE <doc#>
Submission Title: [Frame and packet structure in ]
November 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Simplified geometry for the usage model.
<month year>20 Jan 2006
doc.: IEEE <doc#>
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Considerations on general MAC frame] Date Submitted:
doc.: IEEE <doc#>
<month year> <doc.: IEEE doc> March 2015
May 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Text for General Description of PAC Date Submitted:
May 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: New definitions of terminologies for PAC draft.
doc.: IEEE <doc#>
Sept Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Simulation Results for an NAV Setting Mechanism.
November 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Text Proposal for FCC NPRM Response Date.
doc.: IEEE <doc#>
Submission Title: Proposed resolution of 4G-related comments from LB53
Nov Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Text Proposal for IEEE TG8 PFD: Discovery.
Jan Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Proposed Structure of Contention Free Period.
January 2014 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Comments on IEEE PAC Technical.
doc.: IEEE <doc#>
<month year> doc.: IEEE <030158r0> <March 2003>
<January 2002> doc.: IEEE <02/139r0> March, 2008
September 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suggested TG3c PAR Changes] Date Submitted:
Nov Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Report on IEEE PAC Draft Status]
<month year> <doc.: IEEE doc> September 2015
Doc.: IEEE Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Summary.
Submission Title: TG9ma Agenda for September Meeting
August 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: CID 422 Proposal Date Submitted: 14 August,
Submission Title: TG9ma Closing Report for July Meeting
Presentation transcript:

December 2015 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security considerations for 15.3e] Date Submitted: [10 December 2015] Source: [Jae Seung Lee, and Moon-Sik Lee] Company: [ETRI] Address1: [218 Gajeong-ro, Yuseong-gu, Daejeon, 305-700, Korea] E-Mail1: [jasonlee@etri.re.kr] Abstract: This document discusses security considerations for 15.3e. Purpose: To discuss security considerations for TG3e. Notice: This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributors acknowledge and accept that this contribution becomes the property of IEEE and may be made publicly available by P802.15. Jae Seung Lee (ETRI)

Security Considerations for 15.3e December 2015 Security Considerations for 15.3e December 10, 2015 Jae Seung Lee (ETRI)

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> December 2015 Introduction During the last conference call (December 2), it is decided that we should not remove legacy security features from 15.3e. We should consider which part of the legacy security feature should be modified for 15.3e CCM may not suitable for increased throughput of 15.3e Some part of the legacy spec can be simplified since only P2P link is used in 15.3e Jae Seung Lee (ETRI) <author>, <company>

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> December 2015 CCM vs GCM (1/2) CCM is not suitable for very high speed implementations Legacy 15.3 spec uses CCM CCM consists of counter mode which is used to generate ciphertext of payload and CBC-MAC (Cipher Block Chaining-Message Authentication Code) which is used to make MIC value CBC-MAC is neither pipelinable nor parallelizable Each block is authenticated and encrypted, with the authentication requiring one AES operation and the encryption requiring a second AES operation Authentication uses cipher-block chaining The output from the first block is used on the second block, the output from the second block is used on the third block, and so on. Message authentication of each block depends on the previous block’s operations being completed, preventing parallel operations. There is a practical performance limit placed on real-world implementations: limited to a few Gbps  Not suitable for 15.3e Due to concerns about high latency, 802.11ad and ECMA-387 adopted GCM instead of CCM 802.11ac supports both CCM and GCM for backward compatibility Reference: David A. McGrew and John Viega, The Security and Performance of the Galois/Counter Mode (GCM) of Operation, INDOCRYPT 2004, Springer-Verlag, 343-355 Jae Seung Lee (ETRI) <author>, <company>

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> December 2015 CCM vs GCM (2/2) GCM was designed to efficiently provide authenticated encryption at speeds of 10 gigabits per second and above Rather than using block chaining to authenticate each data block, GCM uses a Galois field multiplication Galois field multiplications can be run in parallel Galois multiplications are less computationally intensive than the cipher block encryption algorithms required by a CBC-MAC enables pipelined high-speed implementations uses ½ the number of AES operations than CCM GCM is recommended by NIST (NIST Special Publication 800- 38D, November, 2007) NSA has adopted GCM in Suite B GCM is the default cipher suite in 802.1ae (MAC Security), 802.11ad, and ECMA 387. GCM is also adopted in 802.11ac Various Authors (TG3e Proposal) <author>, <company>

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> December 2015 CCM and GCM in 802.11ac In 802.11ac, the format of GCMP header is the same as that of CCMP header MIC is extended to 16 octets CCMP in 11ac: GCMP in 11ac: Various Authors (TG3e Proposal) <author>, <company>

doc.: IEEE 802.15-<doc#> <month year> doc.: IEEE 802.15-<doc#> December 2015 Considerations 802.15.3e has no backward compatibility issue, so we can remove CCM and use GCM instead Replacing the cipher suite in the spec will be straightforward Clause 9 Security Specifications should be updated if we adopt GCM instead of CCM Clause 8 should be cleaned up Some part of the clause can be simplified since only P2P link is used in 15.3e Regardless of changing the cipher suite, clause 8 should be cleaned up Various Authors (TG3e Proposal) <author>, <company>