Presentation is loading. Please wait.

Presentation is loading. Please wait.

January 16, 2019 doc.: IEEE r0 September, 2004

Similar presentations


Presentation on theme: "January 16, 2019 doc.: IEEE r0 September, 2004"— Presentation transcript:

1 January 16, 2019 doc.: IEEE r0 September, 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Computational Complexity of CCM* Mode of Operation] Date Submitted: [September 23, 2004] Source: [René Struik] Company [Certicom Corp.] Address [5520 Explorer Drive, 4th Floor, Mississauga, ON Canada L4W 5L1] Voice:[+1 (905) ], FAX: [+1 (905) ], Re: [IEEE submission b (CCM* Specification).] Abstract: [This document explains the computational cost of CCM*, in settings relevant for b.] Purpose: [Education of IEEE b audience, promoting sound technical analysis.] Notice: This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P Rene Struik, Certicom Corp. Rene Struik, Certicom Corp.

2 Computational Complexity of CCM* Mode of Operation
September, 2004 Computational Complexity of CCM* Mode of Operation René Struik, Certicom Research Rene Struik, Certicom Corp.

3 Computational Complexity CCM* Mode Encryption & Authenticity
September, 2004 Computational Complexity CCM* Mode Data transport Confidentiality Authenticity Encryption OFF Encryption ON Authenticity OFF - n AES Authenticity ON n+4 AES 2n+4 AES Assumptions: header size: bytes; message payload size: n 16-byte blocks Payload size (examples) Encryption only Authenticity Encryption & Authenticity 0 bytes - 4 AES 1 – 16 bytes 1 AES 5 AES 6 AES 17 – 32 bytes 2 AES 8 AES 33 – 48 bytes 3 AES 7 AES 10 AES 49 – 64 bytes 12 AES 65 – 80 bytes 9 AES 14 AES Computational complexity independent of {Low, Medium, High} authenticity level! Rene Struik, Certicom Corp.

4 Communication Complexity Security Overhead
September, 2004 Communication Complexity Security Overhead Data transport Confidentiality Authenticity Encryption OFF Encryption ON OFF (0 bits) 5 bytes per frame (freshness info) Low (32 bits) 9=5+4 bytes Medium (64 bits) 13=5+8 bytes High (128 bits) 21=5+16 bytes Security info overhead: at least 5 bytes per frame, even if authenticity is turned OFF! Note: Figures based on CCM* throughout specs (without optimizations, without taking into account fixed broadcast encryption) Rene Struik, Certicom Corp.

5 Implementation Cost AES-128 Block Cipher (in Encryption Mode)
September, 2004 Implementation Cost AES-128 Block Cipher (in Encryption Mode) Block cipher AES-128 Software only Hardware only Code size 800 – 2,300 bytes1 Gate count 6 – 7,000 gates RAM size 60 bytes Typical throughput: Intel 8051 processor, 4 MHz: 10 kbps (source: Rijndael specification, Table 3) Motorola 68HC08, 4 MHz: 60 kbps (source: Rijndael specification, Table 4) Rene Struik, Certicom Corp.


Download ppt "January 16, 2019 doc.: IEEE r0 September, 2004"

Similar presentations


Ads by Google