Abstract
This study is conducted to establish an alternative, creative technique for the structure of Advanced Encryption Standard-Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (AES-CCMP) key in IEEE 802.11i. the structure of proposed method increase the length of AES-CCMP key from 128 bits to 256 bits to eliminate Time-Memory Trade-Off (TMTO) attacks by using three proposed solutions including Random NonceKey, Four Way Handshake alteration and Pseudo Random Function (PRF). Besides, two proposed and classic methods are compared in terms of TMTO attack probability, avalanche effect, changes in neighbor blocks, memory usage and execution time. According to the results, the proposed method is completely resistant to TMTO attack. In addition, avalanche effect and change in neighbor blocks of proposed method are so near to optimized state and also, two classic and proposed methods are approximately the same in case of memory usage and execution time.
The work is funded by RMC, Universiti Technologi Malaysia (UTM) under the vote number C.C. NO. Q.J130000.7128.00J14.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Samiah, A., Aziz, A., Ikram, N.: An Efficient Software Implementation of AES-CCM for IEEE 802.11i Wireless Standard. In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, Beijing (2007)
Razvi Doomun, M., Sunjiv Soyjaudah, K.M.: Resource Saving AES-CCMP Design with Hybrid Counter Mode Block Chaining – MAC. IJCSNS International Journal of Computer Science and Network Security 8, 1–13 (2008)
RFC 3610: Counter with CBC-MAC (CCM), pp. 1–26 (2003)
Algredo-Badillo, I., Feregrino-Uribe, C., Cumplido, R., Morales-Sandoval, M.: Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard. Computers & amp; Electrical Engineering 36, 565–577 (2010)
Khan, M.A., Cheema, A.R., Hasan, A.: Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Phuket (2008)
Hellman, M.E.: A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory IT-26, 6 (1980)
Junaid, M., Mufti, M., Ilyas, M.U.: Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol. Transactions on Engineering, Computing and Technology (World Enformatika Society)Â 11, 6 (2006)
Moore’s law, ftp://download.intel.com/museum/Moores_Law/Printed_Materials/Moores_Law_2pg.pdf1965
He, C., Mitchell, J.C.: Security analysis and improvements for IEEE 802.11i. In: Proceedings of the 12th Annual Network and Distributed System Security Symposium, p. 19 (2005)
Saberi, I., Shojaie, B., Salleh, M., Niknafskermani, M.: Enhanced AES-CCMP Key Structure in IEEE 802.11i. In: International Conference on Computer Science and Network Technology, ICCSNT 2011, Harbin, China (2011)
Nguyen, T.M.T., Sfaxi, M.A., Ghernaouti-Helie, S.: 802.11i Encryption Key Distribution Using Quantum Cryptography. Journal of Networks 1, 9–20 (2006)
Saberi, I., Shojaie, B., Salleh, M.: Enhanced Key Expansion for AES-256 by Using Even-Odd Method. In: 2nd International Conference on Research and Innovation in Information Systems, ICRIIS 2011, Kuala Lumpur (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Saberi, I., Shojaie, B., Salleh, M., Niknafskermani, M., Rostami, M.J. (2012). Preventing TMTO Attack in AES-CCMP in IEEE 802.11i. In: Kwiecień, A., Gaj, P., Stera, P. (eds) Computer Networks. CN 2012. Communications in Computer and Information Science, vol 291. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31217-5_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-31217-5_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31216-8
Online ISBN: 978-3-642-31217-5
eBook Packages: Computer ScienceComputer Science (R0)