03.11.2012 Views

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4-June-07 P1901_PRO_016_r0<br />

NIST800-38A “Recommendations for Block Cipher Modes of Operation. Methods <strong>and</strong> Techniques”. By the use of<br />

CTR IEEE P1901 achieves confidentiality for messages of arbitrary length.<br />

Nevertheless it is still necessary to provide message integrity against tampering. For this purpose IEEE P1901 uses<br />

the operation mode known as CCM (Counter with CBC-<strong>MAC</strong> (Message Authentication Check)) that avoids the use<br />

of a separate mechanism for providing message integrity. CCM mode of operation combines CTR mode of<br />

encryption with the CBC-<strong>MAC</strong> mode of authentication. CCM is defined in RFC 3610 <strong>and</strong> has been used <strong>and</strong><br />

studied for a long time <strong>and</strong> has well-understood cryptographic properties. The interesting point is that the same<br />

encryption key can be used for both processes in conjunction with other parameters, thus leading, in effect, to two<br />

separated keys.<br />

CCM is only defined for 128-bit block ciphers <strong>and</strong>, though it is a generic mode applicable to any many ciphers, in<br />

IETF RFC3610 it is defined for use with 128-bit AES.<br />

CCM has two parameters (M <strong>and</strong> L). M indicates the length of the MIC (Message Integrity Check) <strong>and</strong> L indicates<br />

the length of the message itself. For the selected algorithm M is equal to 4 (thus indicating that the Message<br />

Integrity Check (MIC) produced is 4 bytes long) <strong>and</strong> L is equal to 2 (thus indicating that the length of the message<br />

is at most 2^16 bytes as is exactly the maximum length of a burst).<br />

Encryption <strong>and</strong> Integrity are both based on AES blocks <strong>and</strong> needs a different initialization variables <strong>and</strong> modes to<br />

work. The information about the initial state for desencryption <strong>and</strong> integrity check is transported in the CCMP<br />

Header.<br />

Encryption <strong>and</strong> Integrity are applied when the burst is set as encrypted <strong>and</strong> over each one of the packets or packet<br />

fragments inside the burst payload independently, but using the common initial state contained in the CCMP<br />

Header, that is transmitted only once each burst at the beginning of the payload.<br />

Each MIC is calculated over the Burst Header, CCMP Header, the Interpacket Header added by the LLC layer <strong>and</strong><br />

the packet or fragment of a packet including the padding, <strong>and</strong> then appended to this structure, althought Burst<br />

Header <strong>and</strong> CCMP Header are only transmitted once at the beginning of the Burst.<br />

The encryption algorithm is also applied in a fragment packet or packet basis. Burst Header, CCMP Header <strong>and</strong><br />

Interpacket Headers shall be sent in clear, <strong>and</strong> the encryption is applied over the fragment packet or packet<br />

including its padding <strong>and</strong> the appended MIC.<br />

10.1.2 Detailed encryption process<br />

As has been described before, Encryption <strong>and</strong> Integrity algorithms are applied in a packet or fragment of packet<br />

basis, but using common initial state information for each Burst contained in the CCMP Header.<br />

Submission page 280 UPA-OPERA

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!