Motorola Wireless Broadband Platform manual Advanced Security Techniques

Page 1

Security and the Motorola

Canopy™ Wireless Broadband

Platform

(Advanced Security Techniques)

Image 1
Contents Advanced Security Techniques List of Tables List of Acronyms Page Clear Text Transmissions Passive Monitoring CANOPY’S Proprietary Protocol When an SM attempts to enter the Canopy network Authentication ProcessAP then sends an authentication request to SM calculates a response using either its factoryData Encryption Standard DES X 1038 possible 128-bit keys Advanced Encryption Standard AESEncryption Bits Number of Possible Keys Methods of Encryption and Their Associated Keys4Summary Motorola Canopy