Design and Implementation for Mobile Devices
Abstract
In this chapter the implementation of classic AES-CCMP is clarified and the different parts of implementation are introduced. Also, the suggested solution for overcoming the problems of AES-CCMP in mobile devices is mentioned. Three analyses based on 1-bit change of IC and 1-bit change of key in different rounds and interblocks; and also attack analysis is done supported with required data and graphs in which the reasons of properness and strength of the three proposed modes are analyzed. The randomness of the values is checked with the NIST test suite. These tests focus on a variety of different types of nonrandomness that could exist in a sequence. Two of these tests, which ...
Get Optimizing IEEE 802.11i Resource and Security Essentials now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.