资源描述:
《counter synchronization in encryption algorithm of ieee 802在ieee 802加密算法反同步》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库。
1、CounterSynchronizationinCCMPAlgorithmAnitaFadaviRoudsaryJalilChitizadehSaiedHosseiniKhayatfadavi_r_a@yahoo.comchitizad@ferdowsi.um.ac.irshk@ferdowsi.um.ac.irFerdowsiUniversityofMashad,Mashad,Iran.13thIranianConferenceonElectricalEngineering,Zanjan,Iran,April
2、2005Abstract:ToimprovethesecurityofWirelessLocalAreaNetworks,theIEEEhasrecentlystandardizedthe802.11iprotocol.The802.11iisbasedontwomaincomponents.Itusesanewprotocol,calledCCMPfordata-confidentialityandIEEE802.11X’sKey-distributionsystemtocontrolaccesstothen
3、etwork.InCCMP,apacketissentinclearfordecryptionpossibilitybythereceiver.Toavoidsecurityflaws,thecounterisnotusedmorethanonce.Thismakestheprotocoldependenton802.11Xstandard.Italsoleadstheperformancetodegrade.Inthispaper,anewencryptionmethodisintroducedthateli
4、minatescountertransmissionandbasedonnumericalcalculationsthismethodimprovesthesecurityofCCMPmethod.Keywords:IEEE802.11,Security,CCMP,CounterSynchronization.1.IntroductionAfterIEEE802.11iratification,theCountermodewithCBC-MACProtocol(CCMP)hasbeenthepreferrede
5、ncryptionprotocolinthestandard[1].ThisprotocolisbasedupontheCountermodewithCipherBlockChainingMessageAuthenticationCode(CCM)modeoftheAdvancedEncryptionStandard(AES)encryptionalgorithm.TheCCMPiscomposedoftwocomponents:TheCountermode(CTR)oftheCCMPisthealgorith
6、mthatprovidesdataprivacy.Thesecondcomponent,theCipherBlockChainingMessageAuthenticationCode(CBC-MAC),providesdataintegrityandauthentication[2].Bothofthesecomponentsutilize128-bitkeys,witha48-bitpacketsequencecounter.Aswillbedescribed,thiscounterisusedforencr
7、yptionanddecryptionprocedures.Toenablethereceivertoextracttheplaintextfromanencryptedpacket,allthepacketsmustcontainthiscounterinclear.Toavoidreplay,messageinjectionandmessagedecryptionattacksby13thIranianConferenceonElectricalEngineering,Zanjan,Iran,April20
8、05intruders,countermustnotbeusedmorethanonce.Sowhencounterreuseisnecessary,theencryptionkeyischangedby802.1Xstandard[2],[3].Althoughtheuseof802.1Xstandardmakestheencryptedtrafficsecureenough,the