Skip to main content

An Efficient Design of CCMP for Robust Security Network

  • Conference paper
Information Security and Cryptology - ICISC 2005 (ICISC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3935))

Included in the following conference series:

Abstract

For high data rate, new mechanisms such as Block Ack and frame aggregation are currently being discussed in IEEE 802.11e and IEEE 802.11n, respectively. These mechanisms need a short response time in each MPDU processing. In this paper, we propose an efficient design of CCMP for IEEE 802.11i to support these new MAC mechanisms. The proposed design adopts the mode toggling approach, in which MIC calculation and data encryption are sequentially performed for each 128 bits of the packet in only one AESCCM core. In our design, the response time is reduced to a short constant period, which takes only 44 clock cycles. In addition, we can reduce hardware complexity and power consumption, because our design uses one AES-CCM core and obtains the reasonable data throughput and response time at even low clock frequency. We have implemented the proposed design, which is targeted to Altera Stratix FPGA device. As a result of the experiments, the CCMP features 285 Mbps data throughput and 0.88 μs . response time at 50 MHz frequency.

This research was supported by the MIC (Ministry of Information and Communication), Korea, under the Chung-Ang University HNRC (Home Network Research Center)-ITRC support program supervised by the IITA (Institute of Information Technology Assessment).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IEEE standard 802.11i (July 2004)

    Google Scholar 

  2. Whiting, H.D., Housley, R., Ferguson, M.N.: Counter with CBC-MAC(CCM). RFC 3610 (September 2003)

    Google Scholar 

  3. Jang, H.Y., Shim, J.H., Suk, J.H., Hwang, I.C., Choi, J.R.: Compatible Design Of Ccmp And Ocb Aes Cipher Using Seperated Encryptor And Decryptor For IEEE 802.11I, ISCAS 2004 (2004)

    Google Scholar 

  4. IEEE standard 802.11e/D13.0 (January 2005)

    Google Scholar 

  5. Gast, M.S.: 802.11 Wireless Networks, 2nd edn. O’Reilly, Sebastopol (2005)

    Google Scholar 

  6. Edney, J., Arbaugh, W.A.: Real 802.11 security: Wi-Fi Protected Access and 802.11i. Addison Wesley, Reading (2003)

    Google Scholar 

  7. IEEE P802.11, The Working group for Wireless LANs, http://www.ieee802.org/11/

  8. Jarvinen, K.U., Tommiska, M.T., Skytta, J.O.: A fully pipelined memoryless 17.8 Gbps AES-128 encryptor. In: Proc. International Symposium on Field-Programmable Gate Arrays (FPGA 2003), Monterey, CA, pp. 207–215 (February 2003)

    Google Scholar 

  9. Saggese, G.P., Mazzeo, A., Mazocca, N., Strollo, A.G.M.: An FPGA Based Performance Analysis of the Unrolling, Tiling and Pipelining of the AES algorithm. In: Y. K. Cheung, P., Constantinides, G.A. (eds.) FPL 2003. LNCS, vol. 2778. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  10. Zhang, X., Parhi, K.K.: An Efficent 21.56GBPS Aes Implementation On Fpga. In: Conference Record of the Thirty-Eighth Asilomar Conference, vol. 1 (November 2004)

    Google Scholar 

  11. Whiting, H.D., Housley, R., Ferguson, M.N.: Counter with CBC-MAC(CCM). RFC 3610 (September 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bae, D., Kim, G., Kim, J., Park, S., Song, O. (2006). An Efficient Design of CCMP for Robust Security Network. In: Won, D.H., Kim, S. (eds) Information Security and Cryptology - ICISC 2005. ICISC 2005. Lecture Notes in Computer Science, vol 3935. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734727_28

Download citation

  • DOI: https://doi.org/10.1007/11734727_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33354-8

  • Online ISBN: 978-3-540-33355-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics