AM  Vol.5 No.4 , March 2014
Increase Throughput of CCM Security Mode Using MKP
ABSTRACT


A security protocol is used to ensure the messages transferred over a network free from attack. The CCM security operation mode adopts CTR, and CBC-MAC schemes to implement message ciphering and authentication respectively. There are two limitations of CCM including the secret key which should refresh for each 264 blocks in CTR mode and the authentication operation of CBC-MAC works in sequential fashion on multi-processor system. In this paper, we have proved that the Multiple Key Protocol (MKP) can be used within CTR mode to increase the size of the transferred message. Also, we have showed that the DMAC algorithm is able to decrease the time of authentication operation on multi-processing units system.



Cite this paper
Zukarnain, Z. (2014) Increase Throughput of CCM Security Mode Using MKP. Applied Mathematics, 5, 581-592. doi: 10.4236/am.2014.54055.
References
[1]   Whiting, D., Housley, R. and Ferguson, N. (2003) Counter with CBC-MAC (CCM).

[2]   Lei, J., et al. (2007) Comparative Studies on Authentication and Key Exchange Methods for 802.11 Wireless LAN. Computers & Security, 26, 401-409. http://dx.doi.org/10.1016/j.cose.2007.01.001

[3]   Rogaway, P. (2011) Evaluation of Some Block Cipher Modes of Operation. Technical Report, Cryptography Research and Evaluation Committees (CRYPTREC).

[4]   IEEE Inc. (2003) IEEE 802.15.3 Working Group—Part 15.3: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for High Rate Wireless Personal Area Networks (WPAN). IEEE Draft Standard.

[5]   Yüksel, E., Nielson, H.R. and Nielson, F. (2008) ZigBee-2007 Security Essentials. Proceedings of 13th Nordic Workshop on Secure IT-Systems, 65-82.

[6]   Dworkin, M. (2001) Recommendation for Block Cipher Modes of Operation. Methods and Techniques. DTIC Document.

[7]   Ehrsam, W.F., et al. (1978) Message Verification and Transmission Error Detection by Block Chaining. Google Patents.

[8]   Al-Alak, S., et al. (2013) Randomness Improvement of AES Using MKP. Research Journal of Information Technology, 5, 24-34. http://dx.doi.org/10.3923/rjit.2013.24.34

[9]   Al-Alak, S., et al. (2012) Authentication Time of IEEE 802.15.4 with Multiple-Key Protocol Using Distributed Message Authentication Code Algorithm. Research Journal of Information Technology, 4, 140-154.
http://dx.doi.org/10.3923/rjit.2012.140.154

[10]   Standard, N. (1999) Data Encryption Standard (DES). Federal Information Processing Standards Publication.

[11]   Schneier, B. (1993) The Idea Encryption Algorithm-The International Data Encryption Algorithm (IDEA) May Be One of the Most Secure Block Algorithms Available to the Public Today. Bruce Examines Its 128-Bit-Long Key. Dr Dobb’s Journal-Software Tools for the Professional Programmer, 18, 50-57.

[12]   Rivest, R. (1995) The RC5 Encryption Algorithm. Springer, Berlin.

[13]   Schneier, B. (1994) The Blowfish Encryption Algorithm. Dr Dobb’s Journal-Software Tools for the Professional Programmer, 19, 38-43.

[14]   Fips, N. (2001) 197: Announcing the Advanced Encryption Standard (AES). Information Technology Laboratory, National Institute of Standards and Technology.

[15]   Aladdin, K.S.L. (2000) The Enduring Value of Symmetric Encryption. White Paper.

[16]   Koblitz, N. (1987) Elliptic Curve Cryptosystems. Mathematics of Computation, 48, 203-209.
http://dx.doi.org/10.1090/S0025-5718-1987-0866109-5

[17]   Vanstone, S.A. (2003) Next Generation Security for Wireless: Elliptic Curve Cryptography. Computers & Security, 22, 412-415. http://dx.doi.org/10.1016/S0167-4048(03)00507-8

[18]   Kirlar, B.B. (2011) On the Elliptic Curves y2 = x3 - c with Embedding Degree One. Journal of Computational and applied Mathematics, 235, 4724-4728.
http://dx.doi.org/10.1016/j.cam.2010.08.020

[19]   Edoh, K.D. (2004) Elliptic Curve Cryptography: Java Implementation. Proceedings of the 1st Annual Conference on Information Security Curriculum Development, Kennesaw, 8 October 2004, 88-93.
http://dx.doi.org/10.1145/1059524.1059542

[20]   LAN/MAN, S.C. (2006) IEEE Standard for Information Technology-Telecommunications and Information Exchange between Systems-Local and Metropolitan Area Networks-Specific Requirements--Part 15.4: Wireless MAC and PHY Specifications for Low-Rate WPANs. Control, 1-203.

[21]   Qianqian, M. and Kejin, B. (2009) Security Analysis for Wireless Networks Based on ZigBee. International Forum on Information Technology and Applications, Chengdu, 15-17 May 2009, 158-160.

 
 
Top