counter synchronization in encryption algorithm of ieee 802在ieee 802加密算法反同步

counter synchronization in encryption algorithm of ieee 802在ieee 802加密算法反同步

ID:17044932

大小:252.50 KB

页数:11页

时间:2018-08-27

counter synchronization in encryption algorithm of ieee 802在ieee 802加密算法反同步_第1页
counter synchronization in encryption algorithm of ieee 802在ieee 802加密算法反同步_第2页
counter synchronization in encryption algorithm of ieee 802在ieee 802加密算法反同步_第3页
counter synchronization in encryption algorithm of ieee 802在ieee 802加密算法反同步_第4页
counter synchronization in encryption algorithm of ieee 802在ieee 802加密算法反同步_第5页
资源描述:

《counter synchronization in encryption algorithm of ieee 802在ieee 802加密算法反同步》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库

1、CounterSynchronizationinCCMPAlgorithmAnitaFadaviRoudsaryJalilChitizadehSaiedHosseiniKhayatfadavi_r_a@yahoo.comchitizad@ferdowsi.um.ac.irshk@ferdowsi.um.ac.irFerdowsiUniversityofMashad,Mashad,Iran.13thIranianConferenceonElectricalEngineering,Zanjan,Iran,April

2、2005Abstract:ToimprovethesecurityofWirelessLocalAreaNetworks,theIEEEhasrecentlystandardizedthe802.11iprotocol.The802.11iisbasedontwomaincomponents.Itusesanewprotocol,calledCCMPfordata-confidentialityandIEEE802.11X’sKey-distributionsystemtocontrolaccesstothen

3、etwork.InCCMP,apacketissentinclearfordecryptionpossibilitybythereceiver.Toavoidsecurityflaws,thecounterisnotusedmorethanonce.Thismakestheprotocoldependenton802.11Xstandard.Italsoleadstheperformancetodegrade.Inthispaper,anewencryptionmethodisintroducedthateli

4、minatescountertransmissionandbasedonnumericalcalculationsthismethodimprovesthesecurityofCCMPmethod.Keywords:IEEE802.11,Security,CCMP,CounterSynchronization.1.IntroductionAfterIEEE802.11iratification,theCountermodewithCBC-MACProtocol(CCMP)hasbeenthepreferrede

5、ncryptionprotocolinthestandard[1].ThisprotocolisbasedupontheCountermodewithCipherBlockChainingMessageAuthenticationCode(CCM)modeoftheAdvancedEncryptionStandard(AES)encryptionalgorithm.TheCCMPiscomposedoftwocomponents:TheCountermode(CTR)oftheCCMPisthealgorith

6、mthatprovidesdataprivacy.Thesecondcomponent,theCipherBlockChainingMessageAuthenticationCode(CBC-MAC),providesdataintegrityandauthentication[2].Bothofthesecomponentsutilize128-bitkeys,witha48-bitpacketsequencecounter.Aswillbedescribed,thiscounterisusedforencr

7、yptionanddecryptionprocedures.Toenablethereceivertoextracttheplaintextfromanencryptedpacket,allthepacketsmustcontainthiscounterinclear.Toavoidreplay,messageinjectionandmessagedecryptionattacksby13thIranianConferenceonElectricalEngineering,Zanjan,Iran,April20

8、05intruders,countermustnotbeusedmorethanonce.Sowhencounterreuseisnecessary,theencryptionkeyischangedby802.1Xstandard[2],[3].Althoughtheuseof802.1Xstandardmakestheencryptedtrafficsecureenough,the

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。