Motorola
Wireless Broadband Platform
manual
Advanced Security Techniques
Authorization
Page 1
Security and the Motorola
Canopy™ Wireless Broadband
Platform
(Advanced Security Techniques)
Page 1
Page 2
Image 1
Page 1
Page 2
Contents
Advanced Security Techniques
List of Tables
List of Acronyms
Page
Clear Text Transmissions
Passive Monitoring
CANOPY’S Proprietary Protocol
When an SM attempts to enter the Canopy network
Authentication Process
AP then sends an authentication request to
SM calculates a response using either its factory
Data Encryption Standard DES
X 1038 possible 128-bit keys
Advanced Encryption Standard AES
Encryption Bits Number of Possible Keys
Methods of Encryption and Their Associated Keys4
Summary
Motorola Canopy
Related pages
What types of audio settings can be adjusted on the
Russound CAS44
?
Top
Page
Image
Contents