Manuals
/
Motorola
/
Computer Equipment
/
Network Router
Motorola
Wireless Broadband Platform
manual
Advanced Security Techniques
Models:
Wireless Broadband Platform
1
1
13
13
Download
13 pages
39.88 Kb
1
2
3
4
5
6
7
8
Authorization
Page 1
Image 1
Security and the Motorola
Canopy™ Wireless Broadband
Platform
(Advanced Security Techniques)
Page 1
Page 2
Page 1
Image 1
Page 1
Page 2
Contents
Advanced Security Techniques
List of Tables
List of Acronyms
Page
Clear Text Transmissions
Passive Monitoring
CANOPY’S Proprietary Protocol
When an SM attempts to enter the Canopy network
Authentication Process
AP then sends an authentication request to
SM calculates a response using either its factory
Data Encryption Standard DES
X 1038 possible 128-bit keys
Advanced Encryption Standard AES
Encryption Bits Number of Possible Keys
Methods of Encryption and Their Associated Keys4
Summary
Motorola Canopy
Top
Page
Image
Contents