RM0453
GMAC is similar to GCM, except that it is applied on a message composed only by plaintext
authenticated data (that is, only header, no payload).
Counter with CBC-MAC (CCM) principle
Legend
In Counter with cipher block chaining-message authentication code (CCM) mode, the
plaintext message is encrypted while a message authentication code (MAC) is computed in
parallel, thus generating the corresponding ciphertext and the corresponding MAC (also
known as tag). It is described by NIST in Special Publication 800-38C, Recommendation for
Block Cipher Modes of Operation - The CCM Mode for Authentication and Confidentiality.
CCM mode is based on AES in counter mode for confidentiality and it uses CBC for
computing the message authentication code. It requires an initial value.
Like GCM, the CCM chaining mode can be applied on a message composed only by
plaintext authenticated data (that is, only header, no payload). Note that this way of using
CCM is not called CMAC (it is not similar to GCM/GMAC), and its usage is not
recommended by NIST.
23.4.4
AES procedure to perform a cipher operation
Introduction
A typical cipher operation is explained below. Detailed information is provided in sections
starting from
Figure 107. CCM encryption and authentication principle
B0
key
key
Init
(Encrypt)
Plaintext block 1
Ciphertext block 1
Initialization
vector
key
Encrypt
input
output
XOR
Section 23.4.8: AES basic chaining modes (ECB,
Count 1
+1
Count 2
key
Encrypt
Encrypt
Plaintext block 2
Ciphertext block 2
Encrypt
RM0453 Rev 1
AES hardware accelerator (AES)
+1
Count 3
key
Encrypt
Plaintext block 3
Ciphertext block 3
Encrypt
Final
TAG
CBC).
MSv42145V1
657/1461
698
Need help?
Do you have a question about the STM32WL5 Series and is the answer not in the manual?
Questions and answers