期刊文献+

集中式无线局域网分离介质访问控制的CCMP设计

Design of CCMP based on split medium access control of centralized wireless local area network
下载PDF
导出
摘要 针对临时密钥完整性协议(TKIP)潜在的安全缺陷,提出了一种新的可有效提高无线网络安全性的现场可编程门阵列(FPGA)的计数器模式和密码分组链接消息认证模式协议(CCMP)的设计方案。研究了CCMP的机密性原理,分析表明CCMP比TKIP提供了更为安全的保障。在已有的集中式无线局域网(WLAN)分离介质访问控制(MAC)架构下,给出了CCMP模块的实现方法和电路结构。分析比较了现有的4种高级加密标准(AES)实现方案的运行性能,测试结果表明该实现方案能提供更高的加密性能,提高了无线网络的机密性。 Concerning the potential security flaws of Temporal Key Integrity Protocol(TKIP),a new scheme for implementing counter mode with cipher-block chaining with message authentication code protocol(CCMP) based on Field Programmable Gate Array(FPGA) was proposed.The circuit architecture of CCMP process was implemented based on the existing centralized Wireless Local Area Network(WLAN) split Medium Access Control(MAC) architecture.By comparing the performances of four different Advanced Encryption Standard(AES) implementations,the test results indicate that the proposed scheme can provide higher encryption performance and enhance wireless confidentiality.
作者 刘立群
出处 《计算机应用》 CSCD 北大核心 2011年第8期2159-2161,共3页 journal of Computer Applications
基金 国家自然科学基金资助项目(61063028)
关键词 分离介质访问控制 计数器模式和密码分组链接消息认证模式协议 高级加密标准 计数器模式数据加密 密码分组链接消息认证码完整性检查 split Medium Access Control(MAC) counter mode with cipher-block chaining with message authentication code protocol(CCMP) Advanced Encryption Standard(AES) Counter Mode(CTR) for data confidentiality Cipher-block Chaining with Message Authentication Code(CBC-MAC) for authentication and integrity
  • 相关文献

参考文献11

  • 1IETFRFC 4118: Architecture taxonomy for control and provisioning of wireless access points (CAPWAP) [ EB/OL]. [ 2011 - O1 - 02]. http://www, apps. ietf. org/rfc/rfc4118, html. 被引量:1
  • 2IEEE Standard 802.11:Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications [ S], 1999. 被引量:1
  • 3IEEE Standard 802. 11i:Wireless /AN Medium Access Control (MAC) and Physical Layer (PHY) specifications, Amendment 6: Medium Access Control (MAC) security enhancements [ S], 2004. 被引量:1
  • 4EDNEY J, ARBAUGH W A. Real 802.11 security: Wi-Fi protec- ted access and 802. 11i [ M]. Boston: Addison-Wesley, 2003. 被引量:1
  • 5刘立群,火久元,唐鼎,武文忠.基于集中式WLAN分离MAC架构的TKIP协议[J].计算机工程,2008,34(1):181-183. 被引量:4
  • 6唐鼎,唐晖,林涛,等.一种无线局域网接入方法:中国,101335663[P].2008-12-31. 被引量:1
  • 7邹程,张鹏,邓高明,赵强.AES密码电路抗差分功耗分析设计[J].计算机工程与应用,2009,45(36):63-65. 被引量:2
  • 8McLOONE M, McCANNY J V. High performance single-chip FPGA Rijndael algorithm implementation [ C]// CHES'OI: Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems. Berlin: Springer-Verlag, 2001:65-76. 被引量:1
  • 9CHODOWIEC P, KHUON P, GAJ K. Fast implementation of se- cret-key block ciphers using mixed inner- and outer-round pipelining [C]// Proceedings of the 2001ACM/ SIGDA Ninth International Symposium on Field Programmable Gate Arrays. New York: ACM Press, 2001:94 - 102. 被引量:1
  • 10STANDAERT F X, ROUVROY G, QUISQUATER J J, et al. A methodology to implement block ciphers in reconfigurable hardware and it s application to fast and compact AES Rijndael [ C]// Pro- ceeding ACM/SIGDA 1 lth ACM International Symposium on Field- Programmable Gate Arrays. New York: ACM Press, 2003:216 - 224. 被引量:1

二级参考文献11

  • 1Kocher P,Jaffe J,Jun B.Differential power analysis[C]//Wiener M. Lecture Notes in Computer Science 1666:Advances in Cryptology, Proceedings of CRYPTO'99.Santa Barbara,CA,USA:Springer-Verlag, 1999 : 388-397. 被引量:1
  • 2Brier E,Clavier C,Olivier F.Correlation power analysis with a leakage model[C]//Joye M,Quisquater J J.Leeture Notes in Computer Science 3156:Cryptographic Hardware Embedded System- CHES 2004,USA.[S.l.]:Springer-Verlag,2004: 16-29. 被引量:1
  • 3Standaert F X,Ors S B,Preneel B.Power analysis of an FPGA implementation of Rijndaehis pipelining a DPA ?[c]// Joye M,Quisquater J J.Lecture Notes in Computer Science 3156 Cryptographic Hardware Embedded System-CHES 2004. [S.l.] Springer-Verlag, 2004 : 30-44. 被引量:1
  • 4Ors S B,Gurkaynak F,Oswald E,et al.Power-analysis attack on an ASIC AES implementation[C]//IEEE International Conference on Information Technology:Coding and Computing(ITCC'04).Las Vegas: IEEE, 2004,2 : 546. 被引量:1
  • 5Murphy S.The Advanced Encryptian Standard (AES)[J].Information Security Technical Report, 1999,4(4) : 12-17. 被引量:1
  • 6IETF.Architecture Taxonomy for Control and Provisioning of Wireless Access Points (CAPWAP)[S].RFC 4118,2005-06. 被引量:1
  • 7IEEE Standard 802.11-1999 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications[S],1999. 被引量:1
  • 8国家标准化管理委员会.GB15629.11-2003信息技术系统间远程通信和信息交换局域网和城域网特定要求:无线局域网媒体访问(MAC)和物理(PHY)层规范[S].2003. 被引量:1
  • 9IEEE Standard 802.11i-2004 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications,Amendment 6:Medium Access Control (MAC) Security Enhancements[S].2004. 被引量:1
  • 10Edney J,Arbaugh W A.Real 802.11 Security:Wi-Fi Protected Access and 802.11i[M].USA:Addison-Wesley,2003-07. 被引量:1

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部