IEEE 802.1AEbw-2013
$44.42
IEEE Standard for Local and metropolitan area networks–Media Access Control (MAC) Security Amendment 2: Extended Packet Numbering
Published By | Publication Date | Number of Pages |
IEEE | 2013 | 67 |
Amendment Standard – Superseded. The optional use of Cipher Suites that make use of a 64-bit (PN) to allow more than 232 MACsec protected frames to be sent with a single Secure Association Key are specified by this amendment.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 802.1AEbw-2013 Front Cover |
3 | Title page |
6 | Notice to users Laws and regulations Copyrights Updating of IEEE documents Errata |
7 | Patents |
8 | Introduction |
9 | Participants |
11 | Contents |
13 | Figures |
14 | Tables |
15 | Important Notice |
16 | 3. Definitions |
17 | 4. Abbreviations and acronyms |
18 | 7. Principles of secure network operation 7.1.2 Secure Channel (SC) |
19 | 8. MAC Security Protocol (MACsec) 8.2.7 Key exchange and maintenance 8.3 MACsec operation |
21 | 9. Encoding of MACsec protocol data units 9.8 Packet Number (PN) 9.9 Secure Channel Identifier (SCI) |
22 | 10. Principles of MAC Security Entity (SecY) operation 10.5 Secure frame generation 10.5.2 Transmit PN assignment |
23 | 10.6 Secure frame verification |
25 | 10.6.2 PN recovery and pPreliminary replay check |
26 | 10.6.5 Receive indication 10.7 SecY management 10.7.8 Frame verification controls |
27 | 10.7.13 Receive SA creation 10.7.14 Receive SA status |
28 | 10.7.21 Transmit SA creation 10.7.22 Transmit SA status |
29 | 10.7.26 SAK creation 10.7.27 SAK status 10.7.28 SAK controls |
30 | 13. Management protocol 13.7 Use of the MIB with extended packet numbering |
31 | 14. Cipher Suites 14.1 Cipher Suite use |
32 | 14.2 Cipher Suite capabilities 14.4 Cipher Suite conformance 14.6 GCMāAESā256 |
33 | 14.7 GCMāAESāXPN-128 |
34 | 14.8 GCMāAESāXPN-256 |
36 | Annex A (normative) PICS Proforma A.13 Additional variant Cipher Suite capabilities |
37 | Annex B (informative) Bibliography |
39 | Annex C MACsec Test Vectors |
40 | C.1 Integrity protection (54-octet frame) |
41 | C.1.1 GCM-AES-128 (54-octet frame integrity protection) |
42 | C.1.2 GCM-AES-256 (54-octet frame integrity protection) |
43 | C.1.3 GCM-AES-XPN-128 (54-octet frame integrity protection) |
44 | C.1.4 GCM-AES-XPN-256 (54-octet frame integrity protection) |
45 | C.2 Integrity protection (60-octet frame) |
46 | C.2.3 GCM-AES-XPN-128 (60-octet frame integrity protection) |
47 | C.2.4 GCM-AES-XPN-256 (60-octet frame integrity protection) |
48 | C.3 Integrity protection (65-octet frame) |
49 | C.3.3 GCM-AES-XPN-128 (65-octet frame integrity protection) |
50 | C.3.4 GCM-AES-XPN-256 (65-octet frame integrity protection) |
51 | C.4 Integrity protection (79-octet frame) |
52 | C.4.3 GCM-AES-XPN-128 (79-octet frame integrity protection) |
53 | C.4.4 GCM-AES-XPN-256 (79-octet frame integrity protection) |
54 | C.5 Confidentiality protection (54-octet frame) |
55 | C.5.1 GCM-AES-128 (54-octet frame confidentiality protection) |
56 | C.5.2 GCM-AES-256 (54-octet frame confidentiality protection) |
57 | C.5.3 GCM-AES-XPN-128 (54-octet frame confidentiality protection) |
58 | C.5.4 GCM-AES-XPN-256 (54-octet frame confidentiality protection) |
59 | C.6 Confidentiality protection (60-octet frame) |
60 | C.6.3 GCM-AES-XPN-128 (60-octet frame confidentiality protection) |
61 | C.6.4 GCM-AES-XPN-256 (60-octet frame confidentiality protection) |
62 | C.7 Confidentiality protection (61-octet frame) |
63 | C.7.3 GCM-AES-XPN-128 (61-octet frame confidentiality protection) |
64 | C.7.4 GCM-AES-XPN-256 (61-octet frame confidentiality protection) |
65 | C.8 Confidentiality protection (75-octet frame) |
66 | C.8.3 GCM-AES-XPN-128 (75-octet frame confidentiality protection) |
67 | C.8.4 GCM-AES-XPN-256 (75-octet frame confidentiality protection) |