IEEE ISO IEC 8802 1AE:2013 Amd.1 2015
$39.00
ISO/IEC/IEEE International Standard for Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Part 1AE: Media access control (MAC) security – AMENDMENT 1: Galois Counter Model — Advanced Encryption Standard-256 (GCMAES-256) Cipher Suite
Published By | Publication Date | Number of Pages |
IEEE | 2015 | 57 |
– Active. This amendment specifies the GCM-AES-256 Cipher Suite as an option in addition to the existing mandatory to implement Default Cipher Suite, GCM-AES-128.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | ISO/IEC/IEEE 8802-1AE/Amd 1-2015 Front Cover |
5 | IEEE Std 802.1AEbn-2011 Front Cover |
7 | Title page |
10 | Introduction Notice to users Laws and regulations Copyrights Updating of IEEE documents |
11 | Errata Interpretations Patents |
12 | Participants |
15 | Contents |
16 | Figures |
17 | Tables |
19 | Important Notice |
20 | 1. Overview 1.1 Introduction 1.2 Scope |
21 | 2. Normative references |
22 | 6. Secure provision of the MAC Service 6.1 MACsec connectivity |
23 | 7. Principles of secure network operation 7.1.2 Use of the secure MAC Service by bridges 7.3.1 Client policies 7.3.2 Use of the secure MAC Service by bridges |
24 | 8. MAC Security Protocol (MACsec) 8.1.3 Interoperability requirements |
25 | 9. Encoding of MACsec protocol data units 9.8 Transmit SA status |
26 | 10. Principle of MAC Security Entity (SecY) operation 10.7.22 Transmit SA status |
27 | 11. MAC Security in Systems 11.7 MACsec in Provider Bridged Networks |
28 | 14. Cipher Suites 14.1 Cipher Suite use 14.4 Cipher Suite conformance |
29 | 14.5 Default Cipher Suite (GCM-AES-128) 14.6 GCM-AES-256 |
31 | Annex B (informative) Bibliography |
32 | Annex C (informative) MACsec Test Vectors |
33 | C.1 Integrity protection (54-octet frame) |
34 | C.1.1 GCM-AES-128 (54-octet frame integrity protection) |
35 | C.1.2 GCM-AES-256 (54-octet frame integrity protection) |
36 | C.2 Integrity protection (60-octet frame) |
37 | C.2.1 GCM-AES-128 (60-octet frame integrity protection) |
38 | C.2.2 GCM-AES-256 (60-octet frame integrity protection) |
39 | C.3 Integrity protection (65-octet frame) |
40 | C.3.1 GCM-AES-128 (65-octet frame integrity protection) |
41 | C.3.2 GCM-AES-256 (65-octet frame integrity protection) |
42 | C.4 Integrity protection (79-octet frame) |
43 | C.4.1 GCM-AES-128 (79-octet frame integrity protection) |
44 | C.4.2 GCM-AES-256 (79-octet frame integrity protection) |
45 | C.5 Confidentiality protection (54-octet frame) |
46 | C.5.1 GCM-AES-128 (54-octet frame confidentiality protection) |
47 | C.5.2 GCM-AES-256 (54-octet frame confidentiality protection) |
48 | C.6 Confidentiality protection (60-octet frame) |
49 | C.6.1 GCM-AES-128 (60-octet frame confidentiality protection) |
50 | C.6.2 GCM-AES-256 (60-octet frame confidentiality protection) |
51 | C.7 Confidentiality protection (61-octet frame) |
52 | C.7.1 GCM-AES-128 (61-octet frame confidentiality protection) |
53 | C.7.2 GCM-AES-256 (61-octet frame confidentiality protection) |
54 | C.8 Confidentiality protection (75-octet frame) |
55 | C.8.1 GCM-AES-128 (75-octet frame confidentiality protection) |
56 | C.8.2 GCM-AES-256 (75-octet frame confidentiality protection) |