ii
T
ABLE OF
C
ONTENTS
Introduction
......................................................................................................................... 1
Why Are Security Measures Necessary?
............................................................................ 1
Clear Text Transmissions
............................................................................................... 1
Passive Monitoring
......................................................................................................... 2
End-to-End Security
........................................................................................................ 2
Security Features of the Canopy System
............................................................................ 2
Canopy’s Proprietary Protocol
........................................................................................ 3
Authentication
................................................................................................................. 3
Key Management
............................................................................................................ 4
Encryption
....................................................................................................................... 5
Data Encryption Standard (DES)
................................................................................ 5
Advanced Encryption Standard (AES)
....................................................................... 6
Summary
............................................................................................................................. 8
List of Tables
Table 1. The Authentication Process
................................................................................. 4
Table 2. Canopy Key Management
.................................................................................... 4
Table 3. Methods of Encryption and Their Associated Keys
............................................. 7