Table of Contents
1 PURPOSE...........................................................................................................................................................1
2 AUTHORITY.....................................................................................................................................................1
3 INTRODUCTION..............................................................................................................................................1
4 DEFINITIONS, ABBREVIATIONS, AND SYMBOLS.................................................................................2
4.1 DEFINITIONS AND ABBREVIATIONS.............................................................................................................2
4.2 SYMBOLS ....................................................................................................................................................4
4.2.1 Variables................................................................................................................................................4
4.2.2 Operations and Functions .....................................................................................................................6
5 PRELIMINARIES.............................................................................................................................................6
5.1 UNDERLYING BLOCK CIPHER ALGORITHM .................................................................................................6
5.2 CRYPTOGRAPHIC PRIMITIVES......................................................................................................................7
5.3 DATA ELEMENTS.........................................................................................................................................7
5.4 INPUT FORMATTING ....................................................................................................................................8
5.5 EXAMPLES OF OPERATIONS AND FUNCTIONS..............................................................................................8
6 CCM SPECIFICATION ...................................................................................................................................9
6.1 GENERATION-ENCRYPTION PROCESS..........................................................................................................9
6.2 DECRYPTION-VERIFICATION PROCESS ......................................................................................................10
APPENDIX A: EXAMPLE OF A FORMATTING AND COUNTER GENERATION FUNCTION.............12
A.1 LENGTH REQUIREMENTS...........................................................................................................................12
A.2 FORMATTING OF THE INPUT DATA ............................................................................................................12
A.2.1 Formatting of the Control Information and the Nonce........................................................................13
A.2.2 Formatting of the Associated Data ......................................................................................................13
A.2.3 Formatting of the Payload ...................................................................................................................14
A.3 FORMATTING OF THE COUNTER BLOCKS...................................................................................................14
APPENDIX B: LENGTH OF THE MAC..............................................................................................................15
B.1 AUTHENTICATION ASSURANCE.................................................................................................................15
B.2 SELECTION OF THE MAC LENGTH.............................................................................................................16
APPENDIX C: EXAMPLE VECTORS .................................................................................................................17
C.1 EXAMPLE 1................................................................................................................................................17
C.2 EXAMPLE 2................................................................................................................................................17
C.3 EXAMPLE 3................................................................................................................................................18
C.4 EXAMPLE 4................................................................................................................................................19
APPENDIX D: REFERENCES...............................................................................................................................21
Table of Figures
Table 1: Formatting of the Flags Octet in B
0
...............................................................................................................13
Table 2: Formatting of B
0
............................................................................................................................................13
Table 3: Formatting of Ctr
i
..........................................................................................................................................14
Table 4: Formatting of the Flags Field in Ctr
i
.............................................................................................................14
iv