新一代安全标准IEEE802.11i更好地解决了无线局域网日益突出的安全问题。CCMP(Counter Mode with CBC-MAC Protocol)是IEEE802.11i中要求强制实现的新加密算法。首先根据AES加密算法和CTR/CBC-MAC模式,介绍了CCMP的基本原理,再探讨了它...新一代安全标准IEEE802.11i更好地解决了无线局域网日益突出的安全问题。CCMP(Counter Mode with CBC-MAC Protocol)是IEEE802.11i中要求强制实现的新加密算法。首先根据AES加密算法和CTR/CBC-MAC模式,介绍了CCMP的基本原理,再探讨了它在无线局域网中的具体实现,最后对其安全性进行了分析。展开更多
A security protocol is used to ensure the messages transferred over a network free from attack. The CCM security operation mode adopts CTR, and CBC-MAC schemes to implement message ciphering and authentication respect...A security protocol is used to ensure the messages transferred over a network free from attack. The CCM security operation mode adopts CTR, and CBC-MAC schemes to implement message ciphering and authentication respectively. There are two limitations of CCM including the secret key which should refresh for each 264 blocks in CTR mode and the authentication operation of CBC-MAC works in sequential fashion on multi-processor system. In this paper, we have proved that the Multiple Key Protocol (MKP) can be used within CTR mode to increase the size of the transferred message. Also, we have showed that the DMAC algorithm is able to decrease the time of authentication operation on multi-processing units system.展开更多
文摘新一代安全标准IEEE802.11i更好地解决了无线局域网日益突出的安全问题。CCMP(Counter Mode with CBC-MAC Protocol)是IEEE802.11i中要求强制实现的新加密算法。首先根据AES加密算法和CTR/CBC-MAC模式,介绍了CCMP的基本原理,再探讨了它在无线局域网中的具体实现,最后对其安全性进行了分析。
文摘A security protocol is used to ensure the messages transferred over a network free from attack. The CCM security operation mode adopts CTR, and CBC-MAC schemes to implement message ciphering and authentication respectively. There are two limitations of CCM including the secret key which should refresh for each 264 blocks in CTR mode and the authentication operation of CBC-MAC works in sequential fashion on multi-processor system. In this paper, we have proved that the Multiple Key Protocol (MKP) can be used within CTR mode to increase the size of the transferred message. Also, we have showed that the DMAC algorithm is able to decrease the time of authentication operation on multi-processing units system.