TABLE OF CONTENTS |
|
Introduction | 1 |
Why Are Security Measures Necessary? | 1 |
Clear Text Transmissions | 1 |
Passive Monitoring | 2 |
2 | |
Security Features of the Canopy System | 2 |
Canopy’s Proprietary Protocol | 3 |
Authentication | 3 |
Key Management | 4 |
Encryption | 5 |
Data Encryption Standard (DES) | 5 |
Advanced Encryption Standard (AES) | 6 |
Summary | 8 |
List of Tables |
|
Table 1. The Authentication Process | 4 |
Table 2. Canopy Key Management | 4 |
Table 3. Methods of Encryption and Their Associated Keys | 7 |