Design and Implementation of WiMAX data transmission encryption solution (1)

Source: Internet
Author: User

0

In the design of various communication devices and terminal electronic products, more and more embedded systems are used to make the products have more powerful functions, as are WiMAX wireless communication devices. Therefore, when designing and developing security technologies in modern network and communication technologies, they must be integrated with embedded technologies. In this paper, a solution of WiMAX wireless access device encryption technology based on AES-CCM encryption algorithm and ARM + VxWorks embedded system is proposed and implemented.

1. Algorithm Implementation Principle

AES symmetric cryptography is widely used for data confidentiality and data integrity authentication. You can select a specific working mode when using it. Currently, the AES algorithm has multiple working modes, such as ECB, CBC, CFB, OFB, CRT, CCM, GCM, and AESKW. Among them, the CCM (Counter with Cipher Block Chaining-Message Authentication Code) mode is a new operation mode that provides both encryption and Authentication services.

1.1 working principle of the CCM Mode

The basic conditions for using the CCM mode include: the sender and receiver define the same group password algorithm Ek () (here the AES Encryption Algorithm), key K, counter generator function, and formatting function F () and identification mark length Tlen, payload length Plen, random value N. The encryption algorithm process is as follows:

Step 1: Calculate the Formatting Function F (N, A, P) to generate the data block sequence B0, B1 ,..., Br (128 B for each block );

The Formatting Function F integrates N, A, and P and groups them into r data blocks. Encrypt the data block to obtain the MAC value T. The counting block generated by the encryption counter function. The encrypted sj and P are different from T or the ciphertext C is obtained. The decryption process is the opposite.

1.2 principle of AES Algorithm

The encryption process of the AES algorithm consists of four different processing stages: byte replacement, row shifting, column confusion, and wheel key addition. After the input data array state is processed for 10 rounds, the encrypted ciphertext is obtained. Structure 1.


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.