{"id":398369,"date":"2024-10-20T04:35:30","date_gmt":"2024-10-20T04:35:30","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-8802-1ae2013-amd-2-2015\/"},"modified":"2024-10-26T08:23:48","modified_gmt":"2024-10-26T08:23:48","slug":"ieee-8802-1ae2013-amd-2-2015","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-8802-1ae2013-amd-2-2015\/","title":{"rendered":"IEEE 8802-1AE:2013\/Amd.2-2015"},"content":{"rendered":"
Adoption Standard – Active. The optional use of Cipher Suites that make use of a 64-bit (PN) to allow more than 2^32 MACsec protected frames to be sent with a single Secure Association Key are specified by this amendment.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | ISO\/IEC\/IEEE 8802-1AE-2013\/Amd 2-2015 Front Cover <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | IEEE Std 802.1AEbw-2013 Front Cover <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Notice to users Laws and regulations Copyrights Updating of IEEE documents Errata <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Patents <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | Figures <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Tables <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | Important Notice <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 3. Definitions <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 4. Abbreviations and acronyms <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 7. Principles of secure network operation 7.1.2 Secure Channel (SC) <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 8. MAC Security Protocol (MACsec) 8.2.7 Key exchange and maintenance 8.3 MACsec operation <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 9. Encoding of MACsec protocol data units 9.8 Packet Number (PN) 9.9 Secure Channel Identifier (SCI) <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 10. Principles of MAC Security Entity (SecY) operation 10.5 Secure frame generation 10.5.2 Transmit PN assignment <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 10.6 Secure frame verification <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 10.6.2 PN recovery and pPreliminary replay check <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 10.6.5 Receive indication 10.7 SecY management 10.7.8 Frame verification controls <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 10.7.13 Receive SA creation 10.7.14 Receive SA status <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 10.7.21 Transmit SA creation 10.7.22 Transmit SA status <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 10.7.26 SAK creation 10.7.27 SAK status 10.7.28 SAK controls <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 13. Management protocol 13.7 Use of the MIB with extended packet numbering <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 14. Cipher Suites 14.1 Cipher Suite use <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 14.2 Cipher Suite capabilities 14.4 Cipher Suite conformance 14.6 GCM\u2013AES\u2013256 <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 14.7 GCM\u2013AES\u2013XPN-128 <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 14.8 GCM\u2013AES\u2013XPN-256 <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | Annex A (normative) PICS Proforma A.13 Additional variant Cipher Suite capabilities <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Annex B (informative) Bibliography <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | Annex C MACsec Test Vectors <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | C.1 Integrity protection (54-octet frame) <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | C.1.1 GCM-AES-128 (54-octet frame integrity protection) <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | C.1.2 GCM-AES-256 (54-octet frame integrity protection) <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | C.1.3 GCM-AES-XPN-128 (54-octet frame integrity protection) <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | C.1.4 GCM-AES-XPN-256 (54-octet frame integrity protection) <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | C.2 Integrity protection (60-octet frame) <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | C.2.3 GCM-AES-XPN-128 (60-octet frame integrity protection) <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | C.2.4 GCM-AES-XPN-256 (60-octet frame integrity protection) <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | C.3 Integrity protection (65-octet frame) <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | C.3.3 GCM-AES-XPN-128 (65-octet frame integrity protection) <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | C.3.4 GCM-AES-XPN-256 (65-octet frame integrity protection) <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | C.4 Integrity protection (79-octet frame) <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | C.4.3 GCM-AES-XPN-128 (79-octet frame integrity protection) <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | C.4.4 GCM-AES-XPN-256 (79-octet frame integrity protection) <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | C.5 Confidentiality protection (54-octet frame) <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | C.5.1 GCM-AES-128 (54-octet frame confidentiality protection) <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | C.5.2 GCM-AES-256 (54-octet frame confidentiality protection) <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | C.5.3 GCM-AES-XPN-128 (54-octet frame confidentiality protection) <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | C.5.4 GCM-AES-XPN-256 (54-octet frame confidentiality protection) <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | C.6 Confidentiality protection (60-octet frame) <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | C.6.3 GCM-AES-XPN-128 (60-octet frame confidentiality protection) <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | C.6.4 GCM-AES-XPN-256 (60-octet frame confidentiality protection) <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | C.7 Confidentiality protection (61-octet frame) <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | C.7.3 GCM-AES-XPN-128 (61-octet frame confidentiality protection) <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | C.7.4 GCM-AES-XPN-256 (61-octet frame confidentiality protection) <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | C.8 Confidentiality protection (75-octet frame) <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | C.8.3 GCM-AES-XPN-128 (75-octet frame confidentiality protection) <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | C.8.4 GCM-AES-XPN-256 (75-octet frame confidentiality protection) <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" ISO\/IEC\/IEEE International Standard for Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Part 1AE: Media Access Control (MAC) security – AMENDMENT 2: Extended Packet Numbering<\/b><\/p>\n |