Chapter 4

Design and Implementation for Mobile Devices


In this chapter the implementation of classic AES-CCMP is clarified and the different parts of implementation are introduced. Also, the suggested solution for overcoming the problems of AES-CCMP in mobile devices is mentioned. Three analyses based on 1-bit change of IC and 1-bit change of key in different rounds and interblocks; and also attack analysis is done supported with required data and graphs in which the reasons of properness and strength of the three proposed modes are analyzed. The randomness of the values is checked with the NIST test suite. These tests focus on a variety of different types of nonrandomness that could exist in a sequence. Two of these tests, which ...

Get Optimizing IEEE 802.11i Resource and Security Essentials now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.