Motorola Wireless Broadband Platform manual Summary

Page 12

internal round structure appears to have good potential to benefit from instruction- level parallelism.”5

AES is commercially available as an option to the Canopy system and can be very effectively used with the BAM.

SUMMARY

The wireless broadband industry has made significant advancements in the last several years both in terms of capabilities and market acceptance. For this trend to continue, however, these wireless networks must embody the types of security provisions outlined in this paper.

Motorola has taken a very proactive stance on the issues of security and offers a wide range of alternatives to its customers ranging from a fully open system to an authenticated/encrypted air link with dynamic session key assignment. Together, authentication, a proprietary protocol and DES or AES techniques form a powerful bond for protecting the Canopy system and the information that is transmitted over the platform. Already, it is making way for powerful new sets of applications for security focused users. We anticipate that as the platform continues to proliferate these types of applications will be the basis for continued growth of wireless broadband solutions.

Additional product information is located at the Canopy website at

www.motorola.com/canopy.

5National Institute of Standards & Technology.

8

Image 12
Contents Advanced Security Techniques List of Tables List of Acronyms Page Clear Text Transmissions Passive Monitoring CANOPY’S Proprietary Protocol Authentication Process When an SM attempts to enter the Canopy networkAP then sends an authentication request to SM calculates a response using either its factoryData Encryption Standard DES Advanced Encryption Standard AES X 1038 possible 128-bit keysMethods of Encryption and Their Associated Keys4 Encryption Bits Number of Possible KeysSummary Motorola Canopy