IEEE ISO IEC 8802 1AE:2013 Amd.2 2015
$48.21
ISO/IEC/IEEE International Standard for Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Part 1AE: Media Access Control (MAC) security – AMENDMENT 2: Extended Packet Numbering
Published By | Publication Date | Number of Pages |
IEEE | 2015 | 72 |
– Active. The optional use of Cipher Suites that make use of a 64-bit (PN) to allow more than 2^32 MACsec protected frames to be sent with a single Secure Association Key are specified by this amendment.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | ISO/IEC/IEEE 8802-1AE-2013/Amd 2-2015 Front Cover |
5 | IEEE Std 802.1AEbw-2013 Front Cover |
7 | Title page |
10 | Notice to users Laws and regulations Copyrights Updating of IEEE documents Errata |
11 | Patents |
12 | Introduction |
13 | Participants |
15 | Contents |
17 | Figures |
18 | Tables |
19 | Important Notice |
20 | 3. Definitions |
21 | 4. Abbreviations and acronyms |
22 | 7. Principles of secure network operation 7.1.2 Secure Channel (SC) |
23 | 8. MAC Security Protocol (MACsec) 8.2.7 Key exchange and maintenance 8.3 MACsec operation |
25 | 9. Encoding of MACsec protocol data units 9.8 Packet Number (PN) 9.9 Secure Channel Identifier (SCI) |
26 | 10. Principles of MAC Security Entity (SecY) operation 10.5 Secure frame generation 10.5.2 Transmit PN assignment |
27 | 10.6 Secure frame verification |
29 | 10.6.2 PN recovery and pPreliminary replay check |
30 | 10.6.5 Receive indication 10.7 SecY management 10.7.8 Frame verification controls |
31 | 10.7.13 Receive SA creation 10.7.14 Receive SA status |
32 | 10.7.21 Transmit SA creation 10.7.22 Transmit SA status |
33 | 10.7.26 SAK creation 10.7.27 SAK status 10.7.28 SAK controls |
34 | 13. Management protocol 13.7 Use of the MIB with extended packet numbering |
35 | 14. Cipher Suites 14.1 Cipher Suite use |
36 | 14.2 Cipher Suite capabilities 14.4 Cipher Suite conformance 14.6 GCM–AES–256 |
37 | 14.7 GCM–AES–XPN-128 |
38 | 14.8 GCM–AES–XPN-256 |
40 | Annex A (normative) PICS Proforma A.13 Additional variant Cipher Suite capabilities |
41 | Annex B (informative) Bibliography |
43 | Annex C MACsec Test Vectors |
44 | C.1 Integrity protection (54-octet frame) |
45 | C.1.1 GCM-AES-128 (54-octet frame integrity protection) |
46 | C.1.2 GCM-AES-256 (54-octet frame integrity protection) |
47 | C.1.3 GCM-AES-XPN-128 (54-octet frame integrity protection) |
48 | C.1.4 GCM-AES-XPN-256 (54-octet frame integrity protection) |
49 | C.2 Integrity protection (60-octet frame) |
50 | C.2.3 GCM-AES-XPN-128 (60-octet frame integrity protection) |
51 | C.2.4 GCM-AES-XPN-256 (60-octet frame integrity protection) |
52 | C.3 Integrity protection (65-octet frame) |
53 | C.3.3 GCM-AES-XPN-128 (65-octet frame integrity protection) |
54 | C.3.4 GCM-AES-XPN-256 (65-octet frame integrity protection) |
55 | C.4 Integrity protection (79-octet frame) |
56 | C.4.3 GCM-AES-XPN-128 (79-octet frame integrity protection) |
57 | C.4.4 GCM-AES-XPN-256 (79-octet frame integrity protection) |
58 | C.5 Confidentiality protection (54-octet frame) |
59 | C.5.1 GCM-AES-128 (54-octet frame confidentiality protection) |
60 | C.5.2 GCM-AES-256 (54-octet frame confidentiality protection) |
61 | C.5.3 GCM-AES-XPN-128 (54-octet frame confidentiality protection) |
62 | C.5.4 GCM-AES-XPN-256 (54-octet frame confidentiality protection) |
63 | C.6 Confidentiality protection (60-octet frame) |
64 | C.6.3 GCM-AES-XPN-128 (60-octet frame confidentiality protection) |
65 | C.6.4 GCM-AES-XPN-256 (60-octet frame confidentiality protection) |
66 | C.7 Confidentiality protection (61-octet frame) |
67 | C.7.3 GCM-AES-XPN-128 (61-octet frame confidentiality protection) |
68 | C.7.4 GCM-AES-XPN-256 (61-octet frame confidentiality protection) |
69 | C.8 Confidentiality protection (75-octet frame) |
70 | C.8.3 GCM-AES-XPN-128 (75-octet frame confidentiality protection) |
71 | C.8.4 GCM-AES-XPN-256 (75-octet frame confidentiality protection) |