{"id":398369,"date":"2024-10-20T04:35:30","date_gmt":"2024-10-20T04:35:30","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-8802-1ae2013-amd-2-2015\/"},"modified":"2024-10-26T08:23:48","modified_gmt":"2024-10-26T08:23:48","slug":"ieee-8802-1ae2013-amd-2-2015","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-8802-1ae2013-amd-2-2015\/","title":{"rendered":"IEEE 8802-1AE:2013\/Amd.2-2015"},"content":{"rendered":"

Adoption Standard – Active. The optional use of Cipher Suites that make use of a 64-bit (PN) to allow more than 2^32 MACsec protected frames to be sent with a single Secure Association Key are specified by this amendment.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nISO\/IEC\/IEEE 8802-1AE-2013\/Amd 2-2015 Front Cover <\/td>\n<\/tr>\n
5<\/td>\nIEEE Std 802.1AEbw-2013 Front Cover <\/td>\n<\/tr>\n
7<\/td>\nTitle page <\/td>\n<\/tr>\n
10<\/td>\nNotice to users
Laws and regulations
Copyrights
Updating of IEEE documents
Errata <\/td>\n<\/tr>\n
11<\/td>\nPatents <\/td>\n<\/tr>\n
12<\/td>\nIntroduction <\/td>\n<\/tr>\n
13<\/td>\nParticipants <\/td>\n<\/tr>\n
15<\/td>\nContents <\/td>\n<\/tr>\n
17<\/td>\nFigures <\/td>\n<\/tr>\n
18<\/td>\nTables <\/td>\n<\/tr>\n
19<\/td>\nImportant Notice <\/td>\n<\/tr>\n
20<\/td>\n3. Definitions <\/td>\n<\/tr>\n
21<\/td>\n4. Abbreviations and acronyms <\/td>\n<\/tr>\n
22<\/td>\n7. Principles of secure network operation
7.1.2 Secure Channel (SC) <\/td>\n<\/tr>\n
23<\/td>\n8. MAC Security Protocol (MACsec)
8.2.7 Key exchange and maintenance
8.3 MACsec operation <\/td>\n<\/tr>\n
25<\/td>\n9. Encoding of MACsec protocol data units
9.8 Packet Number (PN)
9.9 Secure Channel Identifier (SCI) <\/td>\n<\/tr>\n
26<\/td>\n10. Principles of MAC Security Entity (SecY) operation
10.5 Secure frame generation
10.5.2 Transmit PN assignment <\/td>\n<\/tr>\n
27<\/td>\n10.6 Secure frame verification <\/td>\n<\/tr>\n
29<\/td>\n10.6.2 PN recovery and pPreliminary replay check <\/td>\n<\/tr>\n
30<\/td>\n10.6.5 Receive indication
10.7 SecY management
10.7.8 Frame verification controls <\/td>\n<\/tr>\n
31<\/td>\n10.7.13 Receive SA creation
10.7.14 Receive SA status <\/td>\n<\/tr>\n
32<\/td>\n10.7.21 Transmit SA creation
10.7.22 Transmit SA status <\/td>\n<\/tr>\n
33<\/td>\n10.7.26 SAK creation
10.7.27 SAK status
10.7.28 SAK controls <\/td>\n<\/tr>\n
34<\/td>\n13. Management protocol
13.7 Use of the MIB with extended packet numbering <\/td>\n<\/tr>\n
35<\/td>\n14. Cipher Suites
14.1 Cipher Suite use <\/td>\n<\/tr>\n
36<\/td>\n14.2 Cipher Suite capabilities
14.4 Cipher Suite conformance
14.6 GCM\u2013AES\u2013256 <\/td>\n<\/tr>\n
37<\/td>\n14.7 GCM\u2013AES\u2013XPN-128 <\/td>\n<\/tr>\n
38<\/td>\n14.8 GCM\u2013AES\u2013XPN-256 <\/td>\n<\/tr>\n
40<\/td>\nAnnex A (normative) PICS Proforma
A.13 Additional variant Cipher Suite capabilities <\/td>\n<\/tr>\n
41<\/td>\nAnnex B (informative) Bibliography <\/td>\n<\/tr>\n
43<\/td>\nAnnex C
MACsec Test Vectors <\/td>\n<\/tr>\n
44<\/td>\nC.1 Integrity protection (54-octet frame) <\/td>\n<\/tr>\n
45<\/td>\nC.1.1 GCM-AES-128 (54-octet frame integrity protection) <\/td>\n<\/tr>\n
46<\/td>\nC.1.2 GCM-AES-256 (54-octet frame integrity protection) <\/td>\n<\/tr>\n
47<\/td>\nC.1.3 GCM-AES-XPN-128 (54-octet frame integrity protection) <\/td>\n<\/tr>\n
48<\/td>\nC.1.4 GCM-AES-XPN-256 (54-octet frame integrity protection) <\/td>\n<\/tr>\n
49<\/td>\nC.2 Integrity protection (60-octet frame) <\/td>\n<\/tr>\n
50<\/td>\nC.2.3 GCM-AES-XPN-128 (60-octet frame integrity protection) <\/td>\n<\/tr>\n
51<\/td>\nC.2.4 GCM-AES-XPN-256 (60-octet frame integrity protection) <\/td>\n<\/tr>\n
52<\/td>\nC.3 Integrity protection (65-octet frame) <\/td>\n<\/tr>\n
53<\/td>\nC.3.3 GCM-AES-XPN-128 (65-octet frame integrity protection) <\/td>\n<\/tr>\n
54<\/td>\nC.3.4 GCM-AES-XPN-256 (65-octet frame integrity protection) <\/td>\n<\/tr>\n
55<\/td>\nC.4 Integrity protection (79-octet frame) <\/td>\n<\/tr>\n
56<\/td>\nC.4.3 GCM-AES-XPN-128 (79-octet frame integrity protection) <\/td>\n<\/tr>\n
57<\/td>\nC.4.4 GCM-AES-XPN-256 (79-octet frame integrity protection) <\/td>\n<\/tr>\n
58<\/td>\nC.5 Confidentiality protection (54-octet frame) <\/td>\n<\/tr>\n
59<\/td>\nC.5.1 GCM-AES-128 (54-octet frame confidentiality protection) <\/td>\n<\/tr>\n
60<\/td>\nC.5.2 GCM-AES-256 (54-octet frame confidentiality protection) <\/td>\n<\/tr>\n
61<\/td>\nC.5.3 GCM-AES-XPN-128 (54-octet frame confidentiality protection) <\/td>\n<\/tr>\n
62<\/td>\nC.5.4 GCM-AES-XPN-256 (54-octet frame confidentiality protection) <\/td>\n<\/tr>\n
63<\/td>\nC.6 Confidentiality protection (60-octet frame) <\/td>\n<\/tr>\n
64<\/td>\nC.6.3 GCM-AES-XPN-128 (60-octet frame confidentiality protection) <\/td>\n<\/tr>\n
65<\/td>\nC.6.4 GCM-AES-XPN-256 (60-octet frame confidentiality protection) <\/td>\n<\/tr>\n
66<\/td>\nC.7 Confidentiality protection (61-octet frame) <\/td>\n<\/tr>\n
67<\/td>\nC.7.3 GCM-AES-XPN-128 (61-octet frame confidentiality protection) <\/td>\n<\/tr>\n
68<\/td>\nC.7.4 GCM-AES-XPN-256 (61-octet frame confidentiality protection) <\/td>\n<\/tr>\n
69<\/td>\nC.8 Confidentiality protection (75-octet frame) <\/td>\n<\/tr>\n
70<\/td>\nC.8.3 GCM-AES-XPN-128 (75-octet frame confidentiality protection) <\/td>\n<\/tr>\n
71<\/td>\nC.8.4 GCM-AES-XPN-256 (75-octet frame confidentiality protection) <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

ISO\/IEC\/IEEE International Standard for Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Part 1AE: Media Access Control (MAC) security – AMENDMENT 2: Extended Packet Numbering<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2015<\/td>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":398374,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-398369","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/398369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/398374"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=398369"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=398369"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=398369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}