<s>
Counter	O
Mode	O
Cipher	O
Block	O
Chaining	O
Message	B-Algorithm
Authentication	I-Algorithm
Code	I-Algorithm
Protocol	B-Protocol
(	O
Counter	B-Protocol
Mode	I-Protocol
CBC-MAC	I-Protocol
Protocol	I-Protocol
)	O
or	O
CCM	B-Algorithm
mode	I-Algorithm
Protocol	B-Protocol
(	O
CCMP	B-Protocol
)	O
is	O
an	O
encryption	B-Protocol
protocol	I-Protocol
designed	O
for	O
Wireless	B-Architecture
LAN	I-Architecture
products	O
that	O
implements	O
the	O
standards	O
of	O
the	O
IEEE	B-Protocol
802.11i	I-Protocol
amendment	O
to	O
the	O
original	O
IEEE	O
802.11	O
standard	O
.	O
</s>
<s>
CCMP	B-Protocol
is	O
an	O
enhanced	O
data	O
cryptographic	O
encapsulation	O
mechanism	O
designed	O
for	O
data	O
confidentiality	O
and	O
based	O
upon	O
the	O
Counter	O
Mode	O
with	O
CBC-MAC	B-Algorithm
(	O
CCM	B-Algorithm
mode	I-Algorithm
)	O
of	O
the	O
Advanced	B-Algorithm
Encryption	I-Algorithm
Standard	I-Algorithm
(	O
AES	B-Algorithm
)	O
standard	O
.	O
</s>
<s>
It	O
was	O
created	O
to	O
address	O
the	O
vulnerabilities	O
presented	O
by	O
Wired	B-Protocol
Equivalent	I-Protocol
Privacy	I-Protocol
(	O
WEP	O
)	O
,	O
a	O
dated	O
,	O
insecure	O
protocol	B-Protocol
.	O
</s>
<s>
CCMP	B-Protocol
uses	O
CCM	B-Algorithm
that	O
combines	O
CTR	O
mode	O
for	O
data	O
confidentiality	O
and	O
cipher	O
block	O
chaining	O
message	B-Algorithm
authentication	I-Algorithm
code	I-Algorithm
(	O
CBC-MAC	B-Algorithm
)	O
for	O
authentication	O
and	O
integrity	O
.	O
</s>
<s>
CCM	B-Algorithm
protects	O
the	O
integrity	O
of	O
both	O
the	O
MPDU	O
data	O
field	O
and	O
selected	O
portions	O
of	O
the	O
IEEE	O
802.11	O
MPDU	O
header	O
.	O
</s>
<s>
CCMP	B-Protocol
is	O
based	O
on	O
AES	B-Algorithm
processing	O
and	O
uses	O
a	O
128-bit	O
key	O
and	O
a	O
128-bit	O
block	O
size	O
.	O
</s>
<s>
CCMP	B-Protocol
uses	O
CCM	B-Algorithm
with	O
the	O
following	O
two	O
parameters	O
:	O
</s>
<s>
A	O
CCMP	B-Protocol
Medium	O
Access	O
Control	O
Protocol	B-Protocol
Data	O
Unit	O
(	O
MPDU	O
)	O
comprises	O
five	O
sections	O
.	O
</s>
<s>
The	O
second	O
is	O
the	O
CCMP	B-Protocol
header	O
which	O
is	O
composed	O
of	O
8	O
octets	O
and	O
consists	O
of	O
the	O
packet	O
number	O
(	O
PN	O
)	O
,	O
the	O
Ext	O
IV	O
,	O
and	O
the	O
key	O
ID	O
.	O
</s>
<s>
The	O
PN	O
codes	O
are	O
the	O
first	O
two	O
and	O
last	O
four	O
octets	O
of	O
the	O
CCMP	B-Protocol
header	O
and	O
are	O
incremented	O
for	O
each	O
subsequent	O
packet	O
.	O
</s>
<s>
CCMP	B-Protocol
uses	O
these	O
values	O
to	O
encrypt	O
the	O
data	O
unit	O
and	O
the	O
MIC	O
.	O
</s>
<s>
The	O
fourth	O
is	O
the	O
message	B-Algorithm
integrity	I-Algorithm
code	I-Algorithm
(	O
MIC	O
)	O
which	O
protects	O
the	O
integrity	O
and	O
authenticity	O
of	O
the	O
packet	O
.	O
</s>
<s>
Finally	O
,	O
the	O
fifth	O
is	O
the	O
frame	B-Protocol
check	I-Protocol
sequence	I-Protocol
(	O
FCS	O
)	O
which	O
is	O
used	O
for	O
error	O
detection	O
and	O
correction	O
.	O
</s>
<s>
CCMP	B-Protocol
is	O
the	O
standard	O
encryption	B-Protocol
protocol	I-Protocol
for	O
use	O
with	O
the	O
Wi-Fi	O
Protected	O
Access	O
II	O
(	O
WPA2	O
)	O
standard	O
and	O
is	O
much	O
more	O
secure	O
than	O
the	O
Wired	B-Protocol
Equivalent	I-Protocol
Privacy	I-Protocol
(	O
WEP	O
)	O
protocol	B-Protocol
and	O
Temporal	B-Protocol
Key	I-Protocol
Integrity	I-Protocol
Protocol	I-Protocol
(	O
TKIP	O
)	O
of	O
Wi-Fi	O
Protected	O
Access	O
(	O
WPA	O
)	O
.	O
</s>
<s>
CCMP	B-Protocol
provides	O
the	O
following	O
security	O
services	O
:	O
</s>
<s>
Because	O
CCMP	B-Protocol
is	O
a	O
block	O
cipher	O
mode	O
using	O
a	O
128-bit	O
key	O
,	O
it	O
is	O
secure	O
against	O
attacks	O
to	O
the	O
264	O
steps	O
of	O
operation	O
.	O
</s>
