Hifn, MacFergus and RSA Security Submit New AES Encryption Mode to NISTSingle Key for Authentication and Encryption Simplifies Packet Processing And is Free From Patent Protection PR NEWSWIRE - August 20, 2002 08:01 LOS GATOS, Calif., Aug 20, 2002 /PRNewswire-FirstCall via COMTEX/ -- Network security and flow classification market leader Hifn(TM) (Nasdaq: HIFN), announced today its collaboration with MacFergus BV and RSA Security Inc. (Nasdaq: RSAS) to design a new authenticated encryption mode: Counter with CBC (Cipher Block Chaining) MAC (Message Authentication Code), or simply CCM. CCM provides both authentication and encryption in a single key. The use of one key should lead to smaller implementations and require less protected memory.
CCM is a modern construction, building on traditional mechanisms. It has been submitted to the National Institute of Standards and Technology (NIST) for consideration as a standard mode for use with the Advanced Encryption Standard (AES). All of the submissions are available at the NIST Proposed Modes Web page. In addition, IEEE 802 is planning to use CCM to provide authentication, integrity and confidentiality of communications on wireless local area networks and personal area networks.
"The use of a mode that provides authentication and encryption can greatly simplify cryptographic key management," said Russ Housley, Senior Consulting Architect at RSA Security. "Cryptographic key management is one of the most difficult aspects of a security solution, so any simplification is a real contribution."
CCM was designed for use with packet-oriented security protocols, with provisions to authenticate the packet header and the payload, while encrypting only the payload. However, CCM can also be used for encrypting files, messages and other data. CCM uses a single cryptographic key to provide authentication and encryption.
Traditionally, two different cryptographic algorithms are used for authentication and encryption, each requiring its own key. For example, authentication might be provided by HMAC-MD5 and encryption by Triple-DES. Since completely different mechanisms are used, there is no synergy between them. CCM, designed with AES in mind, uses a block cipher to provide both authentication and encryption.
"The adoption of CCM delivers definite technical benefits in the application of 128-bit block ciphers such as AES," says Doug Whiting, Ph.D., chief scientist at Hifn and co-author of the new mode with Niels Ferguson, head of MacFergus BV, and Housley. "The decision of making CCM freely available in the public domain will greatly enhance its value to the security community; if adopted by NIST it can be deployed very quickly, without the constraints of patented products."
NIST has received a number of other submissions of authenticated encryption modes. Details of these submissions are available on the NIST Proposed Modes web page (http://csrc.nist.gov/encryption/modes/proposedmodes/ ). The biggest difference between CCM and these other submission is patent status. CCM is intended to be unencumbered by patents, and the authors of CCM have not, and will not, apply for patents on CCM. |