Enhancing Confidentiality And Integrity In Ieee 802 11i Wireless Networks Computer Science Essay

Categories: Network

Secure informations encoding is an indispensable portion of modern communicating techA­nologies. It can assist to forestall unauA­thorized entree to sensitive informations. This is peculiarly of import for radio webs where anyone can listen in on the communicating. Data transmitted across a web is vulnerable to many types of onslaught. One important measure in the procedure of protecting this information is to code it before transmittal utilizing an appropriate algorithm. They need to be used in an appropriate manner governed by a protocol to be effectual.

All excessively frequently in application development proviso of security is an reconsideration and severely implemented. A solution to this job would be the proviso of a comparatively simple interface to supply security while concealing the inside informations from users. This interface should be able to back up and trade cryptanalytic algorithms with easiness and support related cryptanalytic constructs like cardinal direction in an easy to utilize manner.

AES-CCMP ( Advances Encryption Standard – Counter Mode with Cipher Block Chaining Mode Protocol ) with non-linear agreement of S-box and Key programming is a new wireless security criterion that provides the highest degree of security by using the newest and strongest 128-bit AES encoding algorithm to code and authenticate the information at the same clip.

Get quality help now
checked Verified writer

Proficient in: Network

star star star star 4.7 (348)

“ Amazing as always, gave her a week to finish a big assignment and came through way ahead of time. ”

avatar avatar avatar
+84 relevant experts are online
Hire writer

This paper discusses package execution of AES-CCMP which makes it computationally executable to work out all kinds of security issues in radio webs with easiness of deployment.

Keywords: Encoding, AES-CCMP, S-box, security issues, radio web.

1. Introduction

Mobility support is a outstanding characteristic of radio webs that grant the users anytime anyplace web entree.

Get to Know The Price Estimate For Your Paper
Number of pages
Email Invalid email

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

"You must agree to out terms of services and privacy policy"
Write my paper

You won’t be charged yet!

Despite their promising characteristic, security has become one major concern in radio webs. Wireless local country webs ( WLAN ) are groups of radio networking nodes within a limited geographic country, such as an office edifice or campus that are capable of holding wireless communicating. WLANs are normally implemented as extensions to bing wired local country webs ( LAN ) to supply enhanced user mobility and web entree. The most widely implemented WLAN engineerings are based on the IEEE 802.11 criterion and its amendments.

1.1 IEEE 802.11i

The National Institute of Standards and Technology ( NIST ) recommends that organisations with bing bequest IEEE 802.11 executions develop and implement migration schemes to travel to IEEE 802.11i-based security because of its superior capablenesss. IEEE 802.11i, an IEEE criterion ratified June 24, 2004, is designed to supply enhanced security in the Medium Access Control ( MAC ) bed for 802.11networks. The 802.11i specification defines two categories of security algorithms: Robust Security Network Association ( RSNA ) , and Pre-RSNA. Pre-RSNA security consists of Wired Equivalent Privacy ( WEP ) and 802.11 entity hallmark. RSNA provides two informations confidentiality protocols, called the Temporal Key Integrity Protocol ( TKIP ) and the Counter-mode/CBC-MAC Protocol ( CCMP ) , and the RSNA constitution process, including 802.1X hallmark and cardinal direction protocols.

1.2 Advanced Encryption Standard ( AES )

The Advanced Encryption Standard ( AES ) is an encryption criterion adopted by the U.S. authorities. The criterion comprises three block cyphers, AES-128, AES-192 and AES-256, adopted from a larger aggregation originally published as Rijndael. Each of these cyphers has a 128-bit block size, with cardinal sizes of 128, 192 and 256 spots, severally. AES is the first publically accessible and unfastened cypher approved by the NSA for top secret information.

Figure 1.1 Block diagram of AES

AES Process Cycle

The Basic Structure of the AES

AES is a block cypher developed in attempt to turn to threatened cardinal size of Data Encryption Standard ( DES ) . It allows the informations length of 128 spots while back uping three different cardinal lengths, 128, 192, and 256 spots. As such, a mathematical description of the AES is given in Galois Field ( 28 ) . Each unit of ammunition of the whole operation is divided into four BASIC blocks where informations are treated at either byte or spot degree. The byte construction seems to be natural for low profile microprocessor ( such as 8-bit CPU and microcontrollers ) . The array of bytes organized as a 4A-4 matrix is besides called “ province ” . Those four basic stairss that describe one unit of ammunition of the AES ; BytesSub, ShiftRow, MixColumn, and AddRoundKey are besides known as beds.

Bytes Sub Transformation

This operation is a non-linear byte permutation. It composes of two sub-transformations ; multiplicative opposite and affine transmutation. In typical executions, these two sub-steps are combined into a individual tabular array search called permutation box or S-box.

Shift Row Transformation

This transmutation is a additive diffusion procedure, operates on single row, i.e. each row of the array is rotated by a certain figure of byte places.

Mix Column Transformation

This is besides a additive diffusion procedure. A column vector is multiplied ( in GF ( 28 ) ) with a fixed matrix where bytes are treated as a multinomial of grade less than 4.

Add Round Key

In each unit of ammunition of the AES procedure, each byte of the array is added ( regard to GF ( 28 ) ) to a byte of the corresponding array of the unit of ammunition subkeys. Round keys are generated by a process called “ Round Key Expansion ” or “ KeyScheduling ” . Those sub-keys are derived from the original keys by EXORing of two old columns. For columns that are in multiples of four, the procedure involves circular invariables add-on, byte permutation and switch operations.

All four beds described supra have matching reverse operations. Excluding the first and the last unit of ammunition, the AES with 128-bit unit of ammunition cardinal proceed for nine loops. First unit of ammunition of the encoding performs EXOR with the original key and the last unit of ammunition skips MixColumn transform. The deciphering is the rearward order of the ciphering procedure. Operation stairss are similar and at the comparable complexness. As such the same set of hardware can be shared by both procedures. However, the reverse MixColumn operation requires matrix elements that are rather complicated compared with { 01 } , { 02 } or { 03 } of the forward 1. This consequences in the rebuff complicated decoding hardware.

Block cypher

In cryptanalysis, a block cypher is a symmetric key cypher runing on fixed-length groups of spots, called blocks, with an changeless transmutation. A block cypher encoding algorithm might take ( for illustration ) a 128-bit block of plaintext as input, and end product a corresponding 128-bit block of cypher text. The exact transmutation is controlled utilizing a 2nd input – the secret key. Decryption is similar: the decoding algorithm takes, in this illustration, a 128-bit block of cypher text together with the secret key, and yields the original 128-bit block of plaintext. To code messages longer than the block size ( 128 spots in the above illustration ) , a manner of operation is used.

Block cyphers can be contrasted with watercourse cyphers ; a watercourse cypher operates on single figures one at a clip and the transmutation varies during the encoding. The differentiation between the two types is non ever clear-cut: a block cypher, when used in certain manners of operation, acts efficaciously as a watercourse cypher.

Security in AES

The lone successful published onslaughts against the full AES were side-channel onslaughts on some specific executions. The National Security Agency ( NSA ) reviewed all the AES finalists, including Rijndael, and stated that all of them were unafraid plenty for U.S. Government non-classified informations and announced that AES may be used to protect classified information.

The design and strength of all cardinal lengths of the AES algorithm ( i.e. , 128, 192 and 256 ) are sufficient to protect classified information up to the SECRET degree. TOP SECRET information will necessitate usage of either the 192 or 256 cardinal lengths. The execution of AES in merchandises intended to protect national security systems and/or information must be reviewed and certified by NSA prior to their acquisition and usage.

AES has 10 unit of ammunitions for 128-bit keys, 12 unit of ammunitions for 192-bit keys, and 14 unit of ammunitions for 256-bit keys. By 2006, the best known onslaughts were on 7 unit of ammunitions for 128-bit keys, 8 unit of ammunitions for 192-bit keys, and 9 unit of ammunitions for 256-bit keys.

Figure1.2 AES cardinal enlargement

2. Existing Methods

Temporal Key Integrity Protocol or TKIP is a security protocol used in the IEEE 802.11 radio networking criterion. TKIP was designed by the IEEE 802.11i undertaking group and the Wi-Fi Alliance as a solution to replace WEP without necessitating the replacing of bequest hardware. This was necessary because the breakage of WEP had left WiFi webs without feasible link-layer security, and a solution was required for already deployed hardware.

Wired Equivalent Privacy ( WEP ) is a deprecated algorithm to procure IEEE 802.11 radio webs. Wireless networks broadcast messages utilizing wireless and are therefore more susceptible to listen ining than wired webs.

3. Proposed Method


CCMP ( Counter Mode with Cipher Block Chaining Message Authentication Code Protocol ) is an IEEE 802.11i encoding protocol created to replace both TKIP, the compulsory protocol in WPA, and WEP, the earlier, insecure protocol. CCMP is a compulsory portion of the WPA2 criterion, an optional portion of the WPA criterion, and a needed option for Robust Security Network ( RSN ) Compliant webs. CCMP is besides used in the ITU-T G.hn place and concern networking criterion.

CCMP, portion of the 802.11i criterion, uses the Advanced Encryption Standard ( AES ) algorithm. Unlike in TKIP, cardinal direction and message unity is handled by a individual constituent built around AES utilizing a 128-bit key, a 128-bit block, and 10 unit of ammunitions of encoding per the FIPS 197 criterion.

CCM manner ( Counter with CBC-MAC ) is a manner of operation for cryptanalytic block cyphers. It is an attested encoding algorithm designed to supply both hallmark and privateness. CCM manner is merely defined for block cyphers with a block length of 128 spots. In RFC 3610, it is defined for usage with AES.

Rijndael Algorithm

The Rijndael algorithm is a new coevals symmetric block cypher that supports cardinal sizes of 128, 192 and 256 spots, with informations handled in 128-bit blocks – nevertheless, in surplus of AES design standards, the block sizes can mirror those of the keys. Rijndael uses a variable figure of unit of ammunitions, depending on key/block sizes, as follows: 9 unit of ammunitions if the key/block size is 128 spots, 11 unit of ammunitions if the key/block size is 192 spots, 13 unit of ammunitions if the key/block size is 256 spots

Rijndael is a permutation additive transmutation cypher, non necessitating a Feistel web. It use ternary discreet invertible unvarying transmutations ( beds ) . Specifically, these are: Linear Mix Transform ; Non-linear Transform and Key Addition Transform. Even before the first unit of ammunition, a simple cardinal add-on bed is performed, which adds to security. Thereafter, there are Nr-1 unit of ammunitions and so the concluding unit of ammunition. The transmutations form a State when started but before completion of the full procedure.

The State can be thought of as an array, structured with 4 rows and the column figure being the block length divided by spot length ( for illustration, divided by 32 ) . The cypher cardinal likewise is an array with 4 rows, but the cardinal length divided by 32 to give the figure of columns. The blocks can be interpreted as one-dimensional arrays of 4-byte vectors.

The exact transmutations occur as follows: the byte subtransformation is nonlinear and operates on each of the State bytes independently – the invertible S-box ( permutation tabular array ) is made up of 2 transmutations. The shiftrow transmutation sees the State shifted over variable beginnings. The displacement beginning values are dependent on the block length of the State. The mixcolumn transmutation sees the State columns take on multinomial features over a Galois Field values ( 28 ) , multiplied x4 + 1 ( modulo ) with a fixed multinomial. Finally, the roundkey transform is XORed to the State. The cardinal agenda helps the cypher cardinal find the unit of ammunition keys through cardinal enlargement and unit of ammunition choice.

Overall, the construction of Rijndael displays a high grade of modular design, which should do alteration to counter any onslaught developed in the hereafter much simpler than with past algorithm designs.

Design and Execution

Execution of the CCMP block can be viewed as a individual procedure with inputs and end products, as shown in Fig. 3.1. The decoding stage has the same inputs as the encoding stage ( except that the input MPDU is encrypted ) . This is because the heading information, including the CCMP heading, is transmitted across the nexus in the clear text and can hence be extracted by the receiving system prior to decoding.

The execution of CCMP must maintain a sequence counter called PN, which increments for each package processed.

Figure. 3.1. Encoding and Decryption with CCMP

This prevents an aggressor to recycle a package that has antecedently been sent. The PN is 48-bits long ; big plenty to guarantee it ne’er overflows. Execution of the CCMP encoding block is shown in Fig. 3.2. There are two phases: foremost, the MIC is calculated and appended to the MPDU, and so the full MPDU is encrypted to bring forth the consequences. Both phases use same package faculty for AES encoding as shown in Fig. 3.3. Here plaintext informations can be the first block of 128-bits of CBC-MAC or subsequent XOR information of 128-bits, or the first 128-bits block of IV ( Initial Value ) or each incremented block of IV in CBC-CTR manner. An encrypted MPDU contains two more Fieldss than an unencrypted MPDU. It has the CCMP heading and the MIC value. The MIC value is 8 eights ( 64-bits ) .

Figure 3.2. CCMP Encryption Block

Figure. 3.3. AES encoding algorithm

Survey of Non-Linear Arrangement of S-Box

“ Variations to S-box and Mix Column Transformations of AES ” , suggest fluctuations are designed over the Galois field GF ( 28 ) generated by the crude multinomial x8 + x6 + x5 + x + 1. The proposed S-box is constructed by calculating the powers of a crude root in F*257 and taking the multiplicative opposite of the ensuing entries as in Rijndael ‘s algorithm.

“ Active Boolean Function Nonlinearity Measurement ” , by Terry Ritter, gives a elaborate treatment of cryptanalytic nonlinearity, what it means and how it is computed. Nonlinearity is the figure of spots which must alter in the truth tabular array of a Boolean map to make the closest affine map. If cryptosystems based on additive or affine maps are inherently weak, the ability to mensurate nonlinearity is the ability to mensurate one signifier of strength.

“ Making AES Stronger: AES with Key Dependent S-Box ” , describes AES-KDS as block cypher in which the block length and the cardinal length are specified harmonizing to AES specification. The unit of ammunition map resembles that of AES, but is composed of 5 phases instead than 4 phases. The excess phase named Dynamic S-box is introduced at the beginning of the unit of ammunition map.

“ Boolean Function Design utilizing Hill Climbing Methods ” , William Millan, Andrew Clark and Ed Dawson, outlines a general attack to the iterative incremental betterment of the cryptanalytic belongingss of arbitrary Boolean maps. It gives an overview of the different options available, concentrating on cut downing the maximal value of the Walsh-Hadamard transform and autocorrelation map.

The cryptanalytic strength of the AES depends strongly on the pick of S-box. The S-box in AES provides the non-linearity in the cypher. The S-box used is derived from the multiplicative opposite over GF ( 28 ) , known to hold good non-linearity belongingss. To avoid onslaughts based on simple algebraic belongingss, the S-box is constructed by uniting the reverse map with an invertible affine transmutation. Rijndael is derived form Square algorithm, and is really algebraic. The construction of Square is a substitution-permutation web with eight unit of ammunitions, runing on 128-bit blocks and utilizing a 128-bit key.

We overcome the failings of the bing S-Box by bettering the nonlinearity of S-box by utilizing the Discrete Logarithms for the design of S-box. We besides adopt a new algebraic method to increase the complexness of the S-box.

AES byte permutations are done utilizing non-linear S-boxes. S-boxes are represented as 16×16 arrays where rows and columns are represented as hexadecimal arrays. For two hexadecimal Numberss r & amp ; degree Celsiuss, the S-box returns s ( R, degree Celsius ) .

Discrete Logarithms

The fluctuations of the S-Box are designed over the Galois field GF ( 28 ) generated by the crude multinomial x8 + x6 + x5 + x + 1. The proposed S-box is constructed by calculating the powers of a crude root in F*257 and taking the multiplicative opposite of the ensuing entries as in Rijndael ‘s algorithm. An S-box that uses composing of an advocate function in a premier field and multiplicative opposite function in GF ( 28 ) is proposed. The exponent function with the base component chosen as a crude root in the premier field is differentially 2-uniform and the multiplicative opposite function is differentially 4-uniform. The new S-box is expected to be strong because it has been remarked in that this function is complex plenty to be used a circular map of DES.

Since the constituents in Rijndael ‘s algorithm are independent, a twosome of algorithms with changing grades of security and efficiency can be designed by taking the proposed S-box along with the remainder of the constituents of Rijndael.

Decision and Future work

This paper discussed an efficient package execution of AES-CCMP block cypher to fulfill the security demands of Secure Wireless Networks. Present work involves the S-Box analysis in the Non additive Environment. The work has been simulated in the NS2 Simulator Environment utilizing OTCL and C++ cryptography. The security and the public presentation analysis based on additive and non additive environment is being analysed and the energizer and analytical end product is under research. More research work is required to acquire better public presentation consequence when off lading the encoding procedure from chief processor. In future a hardware/software co-design execution of AES-CCMP could be taken up.

Cite this page

Enhancing Confidentiality And Integrity In Ieee 802 11i Wireless Networks Computer Science Essay. (2020, Jun 02). Retrieved from http://studymoose.com/enhancing-confidentiality-and-integrity-in-ieee-802-11i-wireless-networks-computer-science-new-essay

Enhancing Confidentiality And Integrity In Ieee 802 11i Wireless Networks Computer Science Essay

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment