Motorola Wireless Broadband Platform manual List of Tables, Table Of Contents

Models: Wireless Broadband Platform

1 13
Download 13 pages 39.88 Kb
Page 2
Image 2

TABLE OF CONTENTS

 

Introduction

1

Why Are Security Measures Necessary?

1

Clear Text Transmissions

1

Passive Monitoring

2

End-to-End Security

2

Security Features of the Canopy System

2

Canopy’s Proprietary Protocol

3

Authentication

3

Key Management

4

Encryption

5

Data Encryption Standard (DES)

5

Advanced Encryption Standard (AES)

6

Summary

8

List of Tables

 

Table 1. The Authentication Process

4

Table 2. Canopy Key Management

4

Table 3. Methods of Encryption and Their Associated Keys

7

Page 2
Image 2
Motorola Wireless Broadband Platform manual List of Tables, Table Of Contents