background image

     

     

4

5

Security Overview

The HS Long-Range Handheld transmitter uses the 
HS Series encoder, which is based on CipherLinx™ 
technology. CipherLinx™ is a high-security encryption 
algorithm and wireless protocol designed for remote 
control and remote keyless entry applications. It 
provides a much greater level of security and many 
more features than older technologies on the market, 
such as fixed address or “rolling code” systems. 
Additionally, the CipherLinx™ transmission protocol is much more 
advanced than the simple PWM method employed by many systems. By 
utilizing an advanced serial protocol for data, CipherLinx™ is able to offer 
superior noise immunity, greater range, and increased link reliability, all of 
which are key factors in a wireless system.

CipherLinx™ never sends or accepts the same data twice, never loses 
sync, and changes codes with every packet, not just every button press. 
CipherLinx™ encryption is based on the Skipjack cipher developed by 
the U.S. National Security Agency (NSA), and is widely considered one of 
the most secure ciphers available. There have been no known successful 
attacks on the full Skipjack algorithm. Skipjack is a block cipher that has 
80-bit keys and 64-bit data blocks. Since each packet is longer that 64 
bits, Skipjack is employed in an encryption mode. The particular encryption 
mode chosen for CipherLinx™ is based on the CMC encryption mode, so 
that the resulting cipher is a special kind of function known as a “strong 
PRP” (sPRP). The encryption mode uses several invocations of Skipjack to 
encrypt the 128 bits in each message.

The Skipjack algorithm used by Linx has been proven secure and is 
not modified to avoid any compromise of strength. CipherLinx™ is far 
more than just a Skipjack implementation. CipherLinx's patent-pending 
technology combines multiple calls to the encryption algorithm with a 
proprietary mixing algorithm. CipherLinx™ encryption, as implemented 
in the Linx HS Series, has been independently evaluated by Independent 
Security Evaluators (ISE), a respected security firm that is widely 
recognized for its expertise in electronic security. They concluded that “the 
CipherLinx(

TM

) protocol in the HS Series is well-designed and is an excellent 

choice for applications requiring a secure unidirectional link.” ISE’s full 
evaluation report can be found at www.linxtechnologies.com. In summary, 
CipherLinx™ is a powerful, independently verified, secure encryption 
technology that is well-suited to a wide range of applications. 

CipherLinx

Technology

®

In addition to this high level of security, CipherLinx™ also offers a number 
of features that are unique among remote control products. These include 
a large number of data lines, internal key generation, “button level” control 
permissions, an optional encoder PIN, as well as the ability for the decoder 
to identify the originating encoder. Please refer to the HS Series encoder 
and decoder data guides for full details.

Figure 4: CipherLinx Logo

Summary of Contents for MDEV-315-HH-LR8-HS

Page 1: ...HS Long Range Handheld Transmitter Master Development System User s Guide...

Page 2: ...ems in Life Safety Situations but only with necessary and industry appropriate redundancies and in compliance with applicable safety standards including without limitation ANSI and NFPA standards It i...

Page 3: ...control system so that the range performance can be evaluated Design Benchmark The boards provide a known benchmark against which the performance of a custom design may be judged Application Developm...

Page 4: ...button ten times to generate the KEY 2 Press the GET_KEY button on the back of the transmitter to activate the IR receiver Hold the back of the transmitter close to the decoder boards s IR key transfe...

Page 5: ...ryption mode so that the resulting cipher is a special kind of function known as a strong PRP sPRP The encryption mode uses several invocations of Skipjack to encrypt the 128 bits in each message The...

Page 6: ...tch In an HS based system the keyfobs could easily be configured GET_KEY Button CREATE_PIN Button MODE_IND Window Figure 5 Button Access Holes to open only certain doors guess which one Son gets to op...

Page 7: ...CR2032 lithium button cell In normal use it provides 1 to 2 years of operation To replace the battery remove the access cover by pressing firmly on the label area and sliding it off Once the unit is o...

Page 8: ...Ds which are connected to the decoder data lines These light up when the decoder receives a signal from the encoder to take the data line high LED D0 corresponds to data line D0 and so forth Beneath t...

Page 9: ...the right monitors the decoder data lines and generates commands that are sent to the development software on the PC via the QS Series USB module The RX_IND LED to the left of the module flashes to i...

Page 10: ...QS module is plugged into the computer Windows displays the Found New Hardware Wizard which guides the installation of the drivers Application Note AN 00201 describes the installation of the drivers i...

Page 11: ...D4 D6 DEC_DATA D3 D0 D1 D2 D5 GND D2 D2_IND D3 D3_IND D4 D4_IND D5 D5_IND D6 D6_IND GND R11 200 D7 D7_IND D0 D0_IND D1 D1_IND SEND PDN R7 100K R6 100K R0 100K R1 100K R2 100K R3 100K R4 100K R5 100K...

Page 12: ...GND 1 DATA IN 2 GND 3 LADJ VCC 4 RF OUT 5 GND 6 VCC 7 PDN 8 U3 TXM xxx LR GND VCC GND GND DATA_OUT PDN RF1 R27 620ohm POWER SUPPLY SECTION USB SECTION RF SECTION LATCH RA2 AN2 1 RA3 AN3 2 RA4 AN4 3 R...

Page 13: ...stomer including without limitation breach of contract breach of warranty strict liability or negligence Customer assumes all liability including without limitation liability for injury to person or p...

Reviews: