02443nam 2200565Ka 450 991069529400332120060726145212.0GOVPUB-C13-3f68615a69dcb08d7601511cbf599fec(CKB)5470000002367796(OCoLC)70700300(OCoLC)927735631(EXLCZ)99547000000236779620060726d2004 ua 0engtxtrdacontentcrdamediacrrdacarrierRecommendation for block cipher modes of operation[electronic resource] the CCM mode for authentication and confidentiality /Morris DworkinGaithersburg, MD :U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,[2004]iv, 21 pages digital, PDF fileNIST special publication ;800-38 C.Computer securityTitle from title screen (viewed on July 19, 2006)."May 2004."Includes bibliographical references.This Recommendation defines a mode of operation, called Counter with Cipher Block Chaining-Message Authentication Code (CCM), for a symmetric key block cipher algorithm. CCM may be used to provide assurance of the confidentiality and the authenticity of computer data by combining the techniques of the Counter (CTR) mode and the Cipher Block Chaining-Message Authentication Code (CBC-MAC) algorithm.Recommendation for block cipher modes of operation Computer securityStandardsUnited StatesAuthenticationStandardsData encryption (Computer science)Authenticated encryptionAuthenticationBlock cipherConfidentialityCryptographyEncryptionInformation securityMessage authentication codeMode of operationComputer securityStandardsAuthenticationStandards.Data encryption (Computer science)Dworkin MorrisDworkin M. J1421876National Institute of Standards and Technology (U.S.)GPOGPOBOOK9910695294003321Recommendation for block cipher modes of operation3544412UNINA