Skip to main content

Preventing TMTO Attack in AES-CCMP in IEEE 802.11i

  • Conference paper
Computer Networks (CN 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 291))

Included in the following conference series:

  • 1550 Accesses

Abstract

This study is conducted to establish an alternative, creative technique for the structure of Advanced Encryption Standard-Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (AES-CCMP) key in IEEE 802.11i. the structure of proposed method increase the length of AES-CCMP key from 128 bits to 256 bits to eliminate Time-Memory Trade-Off (TMTO) attacks by using three proposed solutions including Random NonceKey, Four Way Handshake alteration and Pseudo Random Function (PRF). Besides, two proposed and classic methods are compared in terms of TMTO attack probability, avalanche effect, changes in neighbor blocks, memory usage and execution time. According to the results, the proposed method is completely resistant to TMTO attack. In addition, avalanche effect and change in neighbor blocks of proposed method are so near to optimized state and also, two classic and proposed methods are approximately the same in case of memory usage and execution time.

The work is funded by RMC, Universiti Technologi Malaysia (UTM) under the vote number C.C. NO. Q.J130000.7128.00J14.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Samiah, A., Aziz, A., Ikram, N.: An Efficient Software Implementation of AES-CCM for IEEE 802.11i Wireless Standard. In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, Beijing (2007)

    Google Scholar 

  2. Razvi Doomun, M., Sunjiv Soyjaudah, K.M.: Resource Saving AES-CCMP Design with Hybrid Counter Mode Block Chaining – MAC. IJCSNS International Journal of Computer Science and Network Security 8, 1–13 (2008)

    Google Scholar 

  3. RFC 3610: Counter with CBC-MAC (CCM), pp. 1–26 (2003)

    Google Scholar 

  4. Algredo-Badillo, I., Feregrino-Uribe, C., Cumplido, R., Morales-Sandoval, M.: Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard. Computers & amp; Electrical Engineering 36, 565–577 (2010)

    Article  MATH  Google Scholar 

  5. Khan, M.A., Cheema, A.R., Hasan, A.: Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Phuket (2008)

    Google Scholar 

  6. Hellman, M.E.: A cryptanalytic time-memory trade-off. IEEE Transactions on Information Theory IT-26, 6 (1980)

    Google Scholar 

  7. Junaid, M., Mufti, M., Ilyas, M.U.: Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol. Transactions on Engineering, Computing and Technology (World Enformatika Society) 11, 6 (2006)

    Google Scholar 

  8. Moore’s law, ftp://download.intel.com/museum/Moores_Law/Printed_Materials/Moores_Law_2pg.pdf1965

  9. He, C., Mitchell, J.C.: Security analysis and improvements for IEEE 802.11i. In: Proceedings of the 12th Annual Network and Distributed System Security Symposium, p. 19 (2005)

    Google Scholar 

  10. Saberi, I., Shojaie, B., Salleh, M., Niknafskermani, M.: Enhanced AES-CCMP Key Structure in IEEE 802.11i. In: International Conference on Computer Science and Network Technology, ICCSNT 2011, Harbin, China (2011)

    Google Scholar 

  11. Nguyen, T.M.T., Sfaxi, M.A., Ghernaouti-Helie, S.: 802.11i Encryption Key Distribution Using Quantum Cryptography. Journal of Networks 1, 9–20 (2006)

    Article  Google Scholar 

  12. Saberi, I., Shojaie, B., Salleh, M.: Enhanced Key Expansion for AES-256 by Using Even-Odd Method. In: 2nd International Conference on Research and Innovation in Information Systems, ICRIIS 2011, Kuala Lumpur (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Saberi, I., Shojaie, B., Salleh, M., Niknafskermani, M., Rostami, M.J. (2012). Preventing TMTO Attack in AES-CCMP in IEEE 802.11i. In: Kwiecień, A., Gaj, P., Stera, P. (eds) Computer Networks. CN 2012. Communications in Computer and Information Science, vol 291. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31217-5_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31217-5_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31216-8

  • Online ISBN: 978-3-642-31217-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics