2.8.3
Authentication
Authentication establishes a level of a trust between a radio and SwMI. It is a challenge-response
result protocol between two parties based on their common knowledge of a secret key (K) to verify the
identity of each party.
The SwMI Authentication Centre (AuC) provides a single K for authentication, which is shared only with
the radio. The SwMI always initiates Authentication. If set by the service provider, the radio can also
authenticate the SwMI.
2.8.4
Air Interface Encryption
NOTE:
This is a Software Selling Feature.
Enhanced Security consists of Trunked Mode Operation (TMO) Air Interface Encryption class 3G and
DMO class 2.
The radio supports TETRA Air Interface Encryption (AIE) using the standard TETRA public encryption
algorithms, as defined in TETRA Security ETS 300 392-7, TEA1, TEA2, and TEA3. The focus of
cryptography in TETRA is the encryption key. TETRA AIE provides 12 000
8
key combinations.
TETRA TMO has three classes of encryption:
• Class 1 – clear (none)
• Class 2 – static key encryption (SCK)
• Class 3 – derived key encryption (DCK), sometimes called the dynamic key, the Common Cipher
Key (CCK), and the Group Cipher Key (GCK)
TETRA Direct Mode Operation (DMO) has two classes of encryption: Class 1 and Class 2.
The security features supported in the radio depend on the security mode.
Table 2: Security Features Required Per Security Class
Security Feature
Mode
Security
Class 1
Security
Class 2
Security
Class 3
Security
Class 3G
Radio Initiated Authentication
Not Allowed
Not Allowed
Not Allowed
Not Allowed
SwMI Initiated Authentication
Optional
Optional
Mandatory
Mandatory
Mutual Authentication
Optional
Optional
Optional
Optional
Over-the-Air Rekeying (OTAR)
N/A
Optional
Mandatory
Mandatory
SCK AIE
N/A
Mandatory
N/A
N/A
DCK AIE
N/A
N/A
Mandatory
Mandatory
MN003465A01-AF
Chapter 2 : Services and Features
24