LEADER 02443nam 2200565Ka 450 001 9910695294003321 005 20060726145212.0 024 8 $aGOVPUB-C13-3f68615a69dcb08d7601511cbf599fec 035 $a(CKB)5470000002367796 035 $a(OCoLC)70700300 035 $a(OCoLC)927735631 035 $a(EXLCZ)995470000002367796 100 $a20060726d2004 ua 0 101 0 $aeng 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRecommendation for block cipher modes of operation$b[electronic resource] $ethe CCM mode for authentication and confidentiality /$fMorris Dworkin 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,$d[2004] 215 $aiv, 21 pages $cdigital, PDF file 225 1 $aNIST special publication ;$v800-38 C.$aComputer security 300 $aTitle from title screen (viewed on July 19, 2006). 300 $a"May 2004." 320 $aIncludes bibliographical references. 330 3 $aThis Recommendation defines a mode of operation, called Counter with Cipher Block Chaining-Message Authentication Code (CCM), for a symmetric key block cipher algorithm. CCM may be used to provide assurance of the confidentiality and the authenticity of computer data by combining the techniques of the Counter (CTR) mode and the Cipher Block Chaining-Message Authentication Code (CBC-MAC) algorithm. 517 $aRecommendation for block cipher modes of operation 606 $aComputer security$xStandards$zUnited States 606 $aAuthentication$xStandards 606 $aData encryption (Computer science) 610 $aAuthenticated encryption 610 $aAuthentication 610 $aBlock cipher 610 $aConfidentiality 610 $aCryptography 610 $aEncryption 610 $aInformation security 610 $aMessage authentication code 610 $aMode of operation 615 0$aComputer security$xStandards 615 0$aAuthentication$xStandards. 615 0$aData encryption (Computer science) 700 $aDworkin$b Morris 701 $aDworkin$b M. J$01421876 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910695294003321 996 $aRecommendation for block cipher modes of operation$93544412 997 $aUNINA