Motorola Wireless Broadband Platform manual List of Tables

Page 2

TABLE OF CONTENTS

 

Introduction

1

Why Are Security Measures Necessary?

1

Clear Text Transmissions

1

Passive Monitoring

2

End-to-End Security

2

Security Features of the Canopy System

2

Canopy’s Proprietary Protocol

3

Authentication

3

Key Management

4

Encryption

5

Data Encryption Standard (DES)

5

Advanced Encryption Standard (AES)

6

Summary

8

List of Tables

 

Table 1. The Authentication Process

4

Table 2. Canopy Key Management

4

Table 3. Methods of Encryption and Their Associated Keys

7

Image 2
Contents Advanced Security Techniques List of Tables List of Acronyms Page Clear Text Transmissions Passive Monitoring CANOPY’S Proprietary Protocol AP then sends an authentication request to Authentication ProcessWhen an SM attempts to enter the Canopy network SM calculates a response using either its factoryData Encryption Standard DES Advanced Encryption Standard AES X 1038 possible 128-bit keysMethods of Encryption and Their Associated Keys4 Encryption Bits Number of Possible KeysSummary Motorola Canopy