RFC 3610
E663888
RFC 3610 is an IETF specification that defines the Counter with CBC-MAC (CCM) mode of operation for cryptographic block ciphers, commonly used for providing authenticated encryption in network protocols such as Wi-Fi security (CCMP).
All labels observed (1)
| Label | Occurrences |
|---|---|
| RFC 3610 canonical | 1 |
Statements (47)
| Predicate | Object |
|---|---|
| instanceOf |
IETF Request for Comments
ⓘ
cryptography standard ⓘ |
| appliesTo |
cryptographic block ciphers
ⓘ
symmetric key block ciphers ⓘ |
| area | Security ⓘ |
| category | Informational ⓘ |
| defines |
CCM authentication field length options
ⓘ
CCM counter block structure ⓘ CCM decryption process ⓘ CCM encryption process ⓘ CCM message formatting ⓘ CCM mode of operation ⓘ CCM nonce structure ⓘ CCM verification process ⓘ Counter with CBC-MAC NERFINISHED ⓘ authenticated encryption mode ⓘ |
| focusesOn |
combined encryption and authentication with a single key
ⓘ
efficient implementation in constrained environments ⓘ |
| influenced | CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) NERFINISHED ⓘ |
| language | English ⓘ |
| publishedBy |
Internet Engineering Task Force
ⓘ
surface form:
IETF
Internet Engineering Task Force ⓘ |
| recommends | AES as underlying block cipher for CCM ⓘ |
| requires | unique nonce for each key and message combination ⓘ |
| securityProperty |
provides confidentiality and integrity with one primitive
ⓘ
resistance to forgery attacks when used correctly ⓘ |
| specifies |
combined encryption and authentication
ⓘ
format of CCM authentication tag ⓘ format of CCM input blocks ⓘ nonce-based operation for CCM ⓘ processing of associated data in CCM ⓘ processing of payload data in CCM ⓘ tag generation for data integrity ⓘ use of CBC-MAC for authentication ⓘ use of a counter mode for encryption ⓘ use of block ciphers in CCM mode ⓘ |
| standardizes | CCM mode for general-purpose use ⓘ |
| status | Informational RFC ⓘ |
| title | Counter with CBC-MAC (CCM) NERFINISHED ⓘ |
| useCase |
authenticated encryption
ⓘ
confidentiality protection ⓘ data integrity protection ⓘ data origin authentication ⓘ |
| usedBy |
IEEE 802.11i
NERFINISHED
ⓘ
WPA2 NERFINISHED ⓘ |
| usedIn |
Wi-Fi security mechanisms
ⓘ
network security protocols ⓘ |
Referenced by (1)
Full triples — surface form annotated when it differs from this entity's canonical label.