- CCM mode
CCM mode (Counter with
CBC-MAC ) is a mode of operation for cryptographicblock cipher s. It is anauthenticated encryption algorithm designed to provide bothauthentication andprivacy . CCM mode is only defined for block ciphers with a block length of 128 bits. In RFC 3610, it is defined for use with AES.Encryption and authentication
As the name suggests, CCM mode combines the well-known counter mode of encryption with the well-known CBC-MAC mode of authentication. The key insight is that the same encryption key can be used for both, provided that the counter values used in the encryption do not collide with the (pre-)
initialization vector used in the authentication. A [http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/ccm/ccm-ad1.pdf proof of security] exists for this combination, based on the security of the underlying block cipher. In fact, the proof also applies to a generalization of CCM for any size block cipher, and in fact, for any size cryptographically strong pseudo-random function (since in both counter mode and CBC-MAC, the block cipher is only ever used in one direction).CCM mode was designed by Russ Housley, Doug Whiting and
Niels Ferguson . At the time CCM mode was developed, Russ Housley was employed by RSA Laboratories.A minor variation of the CCM, so called CCM*, is used in the
ZigBee standard. CCM* includes all of the features of CCM and additionally offers encryption-only and integrity-only capabilities.Performance
CCM requires two block cipher encryption operations per each block of encrypted and authenticated message and one encryption per each block of associated authenticated data.
Patents
The catalyst for the development of CCM mode was the submission of
OCB mode for inclusion in theIEEE 802.11i standard. Opposition was voiced to the inclusion of OCB mode because of a pendingpatent application on thealgorithm . Inclusion of a patented algorithm meant significant licensing complications for implementors of the standard.While the inclusion of OCB mode was disputed based on these
intellectual property issues, it was agreed that the simplification provided by an authenticated encryption system was desirable. Therefore Housley, et al. developed CCM mode as a potential alternative that was not encumbered by patents.Even though CCM mode is less efficient than OCB mode, a patent free solution was preferable to one complicated by patent licensing issues. Therefore, CCM mode went on to become a mandatory component of the IEEE 802.11i standard, and OCB mode was relegated to optional component status.
ee also
*
EAX mode External links
* [http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/comments/800-38_Series-Drafts/CCM/RW_CCM_comments.pdf A Critique of CCM]
* RFC 3610: Counter with CBC-MAC (CCM)
* RFC 4309: Using Advanced Encryption Standard (AES) CCM Mode with IPsec Encapsulating Security Payload (ESP)References
* [http://csrc.nist.gov/publications/nistpubs/800-38C/SP800-38C_updated-July20_2007.pdf NIST Special Publication 800-38C] Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality
Wikimedia Foundation. 2010.