Critical analysis of counter mode with cipher block chain message authentication mode protocol—CCMP

Authors

  • Idris Ahmed,

    1. Software Research Institute, Athlone Institute of Technology, Athlone, Ireland
    Search for more papers by this author
  • Anne James,

    1. Faculty of Engineering and Computing, Coventry University, Coventry, U.K.
    Search for more papers by this author
  • Dhananjay Singh

    Corresponding author
    1. Department of Electronics Engineering, Hankuk University of Foreign Studies, Cheoin-gu, Yongin-si, Gyeonggi-do, South Korea
    • Correspondence: Dhananjay Singh, Department of Electronics Engineering, Hankuk University of Foreign Studies, 89, Wangsan-ri, Mohyeon-myeon, Cheoin-gu, Yongin-si, Gyeonggi-do 449–791, South Korea.

      E-mail: dsingh@hufs.ac.kr

    Search for more papers by this author

ABSTRACT

CCM/CCMP is a two-cycle authenticate and encrypt (AE) mode. One cycle is used to perform confidentiality computations, and the second cycle is used to compute authenticity and integrity. CCM/CCMP is also a generic composition. CCM/CCMP is actually made up of two separate modes, CBC-MAC and AES counter mode amalgamated together. Although CCM/CCMP is an AE mode, it is not an authenticated encryption with associated data (AEAD) mode. Previous research has suggested that it is a major deficiency for an AE mode not to be an AEAD. Previous critiques of the CCM/CCMP have shown that CBC-MAC and AES counter mode were poorly amalgamated to create the CCM/CCMP. They also showed that CCMP, which was ratified by the IEEE 802.11i workgroup in 2003 and implemented in WPA2, has some security issues. It also has some major efficiency and complexity issues. This research work reviewed the current major AE and AEAD modes such as the Galois counter mode, and the encryption system with keyed integrity and managed oracle and used critical analysis and statistical analysis approaches to identify more deficiencies in the CCM/CCMP. Copyright © 2013 John Wiley & Sons, Ltd.

Ancillary