Motorola Wireless Broadband Platform manual

Page 4

NOTICE

The information in this publication is subject to change without notice. Motorola shall not be liable for technical or editorial errors or omissions nor for any damages resulting from the use of this material.

Each configuration tested or described may or may not be the only available solution. This test is not a determination of product quality or correctness, nor does it ensure compliance with any federal, state or local requirements. Motorola does not warrant products other than its own strictly as stated in Motorola’s product warranties.

MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. Canopy is a trademark of Motorola, Inc. All other product or service names are the property of their respective owners. © Motorola, Inc. 2003.

Image 4
Contents Advanced Security Techniques List of Tables List of Acronyms Page Clear Text Transmissions Passive Monitoring CANOPY’S Proprietary Protocol Authentication Process When an SM attempts to enter the Canopy networkAP then sends an authentication request to SM calculates a response using either its factoryData Encryption Standard DES Advanced Encryption Standard AES X 1038 possible 128-bit keysMethods of Encryption and Their Associated Keys4 Encryption Bits Number of Possible KeysSummary Motorola Canopy