{"id":154774,"date":"2024-10-19T09:12:45","date_gmt":"2024-10-19T09:12:45","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-iso-iec-8802-1ae2013-amd-1-2015\/"},"modified":"2024-10-25T01:28:13","modified_gmt":"2024-10-25T01:28:13","slug":"ieee-iso-iec-8802-1ae2013-amd-1-2015","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-iso-iec-8802-1ae2013-amd-1-2015\/","title":{"rendered":"IEEE ISO IEC 8802 1AE:2013 Amd.1 2015"},"content":{"rendered":"
– Active. This amendment specifies the GCM-AES-256 Cipher Suite as an option in addition to the existing mandatory to implement Default Cipher Suite, GCM-AES-128.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | ISO\/IEC\/IEEE 8802-1AE\/Amd 1-2015 Front Cover <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | IEEE Std 802.1AEbn-2011 Front Cover <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Introduction Notice to users Laws and regulations Copyrights Updating of IEEE documents <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Errata Interpretations Patents <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | Figures <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | Tables <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Important Notice <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 1. Overview 1.1 Introduction 1.2 Scope <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 2. Normative references <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6. Secure provision of the MAC Service 6.1 MACsec connectivity <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 7. Principles of secure network operation 7.1.2 Use of the secure MAC Service by bridges 7.3.1 Client policies 7.3.2 Use of the secure MAC Service by bridges <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 8. MAC Security Protocol (MACsec) 8.1.3 Interoperability requirements <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 9. Encoding of MACsec protocol data units 9.8 Transmit SA status <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 10. Principle of MAC Security Entity (SecY) operation 10.7.22 Transmit SA status <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 11. MAC Security in Systems 11.7 MACsec in Provider Bridged Networks <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 14. Cipher Suites 14.1 Cipher Suite use 14.4 Cipher Suite conformance <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 14.5 Default Cipher Suite (GCM-AES-128) 14.6 GCM-AES-256 <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | Annex B (informative) Bibliography <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Annex C (informative) MACsec Test Vectors <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | C.1 Integrity protection (54-octet frame) <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | C.1.1 GCM-AES-128 (54-octet frame integrity protection) <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | C.1.2 GCM-AES-256 (54-octet frame integrity protection) <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | C.2 Integrity protection (60-octet frame) <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | C.2.1 GCM-AES-128 (60-octet frame integrity protection) <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | C.2.2 GCM-AES-256 (60-octet frame integrity protection) <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | C.3 Integrity protection (65-octet frame) <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | C.3.1 GCM-AES-128 (65-octet frame integrity protection) <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | C.3.2 GCM-AES-256 (65-octet frame integrity protection) <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | C.4 Integrity protection (79-octet frame) <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | C.4.1 GCM-AES-128 (79-octet frame integrity protection) <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | C.4.2 GCM-AES-256 (79-octet frame integrity protection) <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | C.5 Confidentiality protection (54-octet frame) <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | C.5.1 GCM-AES-128 (54-octet frame confidentiality protection) <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | C.5.2 GCM-AES-256 (54-octet frame confidentiality protection) <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | C.6 Confidentiality protection (60-octet frame) <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | C.6.1 GCM-AES-128 (60-octet frame confidentiality protection) <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | C.6.2 GCM-AES-256 (60-octet frame confidentiality protection) <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | C.7 Confidentiality protection (61-octet frame) <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | C.7.1 GCM-AES-128 (61-octet frame confidentiality protection) <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | C.7.2 GCM-AES-256 (61-octet frame confidentiality protection) <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | C.8 Confidentiality protection (75-octet frame) <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | C.8.1 GCM-AES-128 (75-octet frame confidentiality protection) <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | C.8.2 GCM-AES-256 (75-octet frame confidentiality protection) <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" ISO\/IEC\/IEEE International Standard for Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Part 1AE: Media access control (MAC) security – AMENDMENT 1: Galois Counter Model — Advanced Encryption Standard-256 (GCMAES-256) Cipher Suite<\/b><\/p>\n |