Network Working Group the Advanced Encryption Standard-cipher-based Message Authentication Code-pseudo-random Function-128 (aes-cmac-prf-128) Algorithm for the Internet Key Exchange Protocol (ike)

نویسنده

  • R. Poovendran
چکیده

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract Some implementations of IP Security (IPsec) may want to use a pseudo-random function (PRF) based on the Advanced Encryption Standard (AES). This memo describes such an algorithm, called AES-CMAC-PRF-128. It supports fixed and variable key sizes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Advanced Encryption Standard-Cipher-based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE)

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract Some implementations of IP Secur...

متن کامل

RFC 4493 The AES - CMAC Algorithm

The National Institute of Standards and Technology (NIST) has recently specified the Cipher-based Message Authentication Code (CMAC), which is equivalent to the One-Key CBC MAC1 (OMAC1) submitted by Iwata and Kurosawa. This memo specifies an authentication algorithm based on CMAC with the 128-bit Advanced Encryption Standard (AES). This new authentication algorithm is named AES-CMAC. The purpos...

متن کامل

The AES-XCBC-PRF-128 Algorithm for the Internet Key Exchange Protocol (IKE)

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract Some implementations of IP Secur...

متن کامل

AVR411: Secure Rolling Code Algorithm for Wireless Link

● Uses advanced encryption standard (AES) and its cipher-based message authentication code (CMAC) mode of operation for transmitter authentication ● 128, 192 or 256 Bit key sizes supported ● Uses sleep modes for low-power consumption ● Less than 30ms response time ● PC command-line tools for cryptographic key management ● Multiple transmitters supported ● Secure learning mechanism for introduci...

متن کامل

Chaskey: a Lightweight MAC Algorithm for Microcontrollers

We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm for 32-bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot implement standard MAC algorithms because of stringent requirements on speed, energy consump­ tion, or code size. Chaskey is a permutation-based MAC algorithm that uses the Addition-RotationXOR (ARX) design method...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006