Network Working Group the Advanced Encryption Standard-cipher-based Message Authentication Code-pseudo-random Function-128 (aes-cmac-prf-128) Algorithm for the Internet Key Exchange Protocol (ike)
نویسنده
چکیده
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract Some implementations of IP Security (IPsec) may want to use a pseudo-random function (PRF) based on the Advanced Encryption Standard (AES). This memo describes such an algorithm, called AES-CMAC-PRF-128. It supports fixed and variable key sizes.
منابع مشابه
The Advanced Encryption Standard-Cipher-based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE)
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract Some implementations of IP Secur...
متن کاملRFC 4493 The AES - CMAC Algorithm
The National Institute of Standards and Technology (NIST) has recently specified the Cipher-based Message Authentication Code (CMAC), which is equivalent to the One-Key CBC MAC1 (OMAC1) submitted by Iwata and Kurosawa. This memo specifies an authentication algorithm based on CMAC with the 128-bit Advanced Encryption Standard (AES). This new authentication algorithm is named AES-CMAC. The purpos...
متن کاملThe AES-XCBC-PRF-128 Algorithm for the Internet Key Exchange Protocol (IKE)
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract Some implementations of IP Secur...
متن کاملAVR411: Secure Rolling Code Algorithm for Wireless Link
● Uses advanced encryption standard (AES) and its cipher-based message authentication code (CMAC) mode of operation for transmitter authentication ● 128, 192 or 256 Bit key sizes supported ● Uses sleep modes for low-power consumption ● Less than 30ms response time ● PC command-line tools for cryptographic key management ● Multiple transmitters supported ● Secure learning mechanism for introduci...
متن کاملChaskey: a Lightweight MAC Algorithm for Microcontrollers
We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm for 32-bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot implement standard MAC algorithms because of stringent requirements on speed, energy consump tion, or code size. Chaskey is a permutation-based MAC algorithm that uses the Addition-RotationXOR (ARX) design method...
متن کامل