0
In the design of various communication devices and terminal electronic products, more and more embedded systems are used to make the products have more powerful functions, as are WiMAX wireless communication devices. Therefore, when designing and developing security technologies in modern network and communication technologies, they must be integrated with embedded technologies. In this paper, a solution of WiMAX wireless access device encryption technology based on AES-CCM encryption algorithm and ARM + VxWorks embedded system is proposed and implemented.
1. Algorithm Implementation Principle
AES symmetric cryptography is widely used for data confidentiality and data integrity authentication. You can select a specific working mode when using it. Currently, the AES algorithm has multiple working modes, such as ECB, CBC, CFB, OFB, CRT, CCM, GCM, and AESKW. Among them, the CCM (Counter with Cipher Block Chaining-Message Authentication Code) mode is a new operation mode that provides both encryption and Authentication services.
1.1 working principle of the CCM Mode
The basic conditions for using the CCM mode include: the sender and receiver define the same group password algorithm Ek () (here the AES Encryption Algorithm), key K, counter generator function, and formatting function F () and identification mark length Tlen, payload length Plen, random value N. The encryption algorithm process is as follows:
Step 1: Calculate the Formatting Function F (N, A, P) to generate the data block sequence B0, B1 ,..., Br (128 B for each block );
The Formatting Function F integrates N, A, and P and groups them into r data blocks. Encrypt the data block to obtain the MAC value T. The counting block generated by the encryption counter function. The encrypted sj and P are different from T or the ciphertext C is obtained. The decryption process is the opposite.
1.2 principle of AES Algorithm
The encryption process of the AES algorithm consists of four different processing stages: byte replacement, row shifting, column confusion, and wheel key addition. After the input data array state is processed for 10 rounds, the encrypted ciphertext is obtained. Structure 1.