background image

5

Key/Number

Description

Session Key

The session key is calculated separately by the
SM and the BAM, using the Authentication
Key, the ESN, and the random number.  This
key is sent to the AP by the BAM – like the
other keys, it never goes over the air.  The
network operator or the subscriber never sees
this key.  This key is either 56 bits (DES) or
128 bits (AES) in length.

Random Number

A random number is generated by the BAM
and used during each attempt by an SM to
register and authenticate. The subscriber or
network operator never sees this number. This
is a 128 bit number.

Of the three numbers presented in Table 2, only the Authentication Key is settable by the
network operator and it must be set both in the BAM and in the SM.  Further information
about Canopy’s authentication process is detailed in 

Bandwidth and Authentication

(BAM) User Guide.

E

NCRYPTION

The Canopy system also has provisions for the industry-accepted DES with key
management via the Telecommunications Industry Association (TIA) standard BRAID
cryptosystem.  In addition, the Canopy system provides for AES for customers who
require the most secure networks available.  These encryption techniques are transparent
to network firewalls, Dynamic Host Configuration Protocol (DHCP) servers and Network
Address Translation (NAT) devices.

Data Encryption Standard (DES)

DES is an encryption standard that uses an encryption technique developed in the mid
1970s by IBM and then adopted by the Federal government as a federal standard in 1977
for protecting sensitive, but not classified data.  DES was designed so that even if
someone knows some of the plain text data and the corresponding ciphertext, there is no
way to determine the key without trying all possible keys.  The strength of DES
encryption based security rests on the size of the key and the proper protection of the
key.

1

  The following paragraphs discuss details of DES from the document entitled,

Federal Information Processing Standards (FIPS) PUB 46-3 Data Encryption Standard
(DES):

The Data Encryption Standard (DES) specifies two Federal Information
Processing Standards (FIPS) approved cryptographic algorithms as required by
FIPS 140-1.  Encrypting data converts it to an unintelligible form called cipher.

                                                

1

 

Security Complete

, Adapted from 

Active Defense, 

by Chris Brenton with Cameron Hunt.

Summary of Contents for Wireless Broadband Platform

Page 1: ...i Security and the Motorola Canopy Wireless Broadband Platform Advanced Security Techniques ...

Page 2: ...y 2 Security Features of the Canopy System 2 Canopy s Proprietary Protocol 3 Authentication 3 Key Management 4 Encryption 5 Data Encryption Standard DES 5 Advanced Encryption Standard AES 6 Summary 8 List of Tables Table 1 The Authentication Process 4 Table 2 Canopy Key Management 4 Table 3 Methods of Encryption and Their Associated Keys 7 ...

Page 3: ...odule DES Data Encryption Standard DHCP Dynamic Host Configuration Protocol FIPS Federal Information Processing Standards IP Internet Protocol LAN Local Area Network NAT Network Address Translation QoS Quality of Service SM Subscriber Module SNMP Simple Network Management Protocol SQL Structured Queary Language TIA Telecommunications Industry Association ...

Page 4: ... available solution This test is not a determination of product quality or correctness nor does it ensure compliance with any federal state or local requirements Motorola does not warrant products other than its own strictly as stated in Motorola s product warranties MOTOROLA and the Stylized M Logo are registered in the US Patent Trademark Office Canopy is a trademark of Motorola Inc All other pr...

Page 5: ...ty and the Motorola Canopy Broadband Wireless Platform offers a snapshot of some of the security issues being faced by the wireless broadband industry as well as the safeguards that Motorola is employing in the Canopy platform to ensure the security and integrity of this advanced system for our customers WHY ARE SECURITY MEASURES NECESSARY When the Internet was first introduced there was little co...

Page 6: ...e network These include Access Point AP Subscriber Module SM Backhaul BH Module Cluster Management Module CMM Bandwidth and Authentication Manager BAM The Canopy system security does not include elements outside of the wireless transport such as Client Computer Wireless Modems Local Area Networks Routers Printers Servers Various Network Peripheral Equipment Protecting equipment outside of the Cano...

Page 7: ...r the air is scrambled into 64 byte data packages thus providing an additional obstacle to unauthorized decoding Finally the directionality of the Canopy system transmissions impedes eavesdropping In other words the proprietary air interface presents a major hurdle for unauthorized parties Of course the Canopy system s security is not based merely on secrecy of its air interface AUTHENTICATION Cle...

Page 8: ...ion 8 If the results do not agree or the SM is not in the database the BAM sends the AP a message denying authentication and the AP sends the SM a message to lock itself out from that AP for 15 minutes before retrying KEY MANAGEMENT The Canopy system uses an ESN two keys and a random number for authentication Table 2 details the functionality of each of these along with the random number Table 2 C...

Page 9: ...tem provides for AES for customers who require the most secure networks available These encryption techniques are transparent to network firewalls Dynamic Host Configuration Protocol DHCP servers and Network Address Translation NAT devices Data Encryption Standard DES DES is an encryption standard that uses an encryption technique developed in the mid 1970s by IBM and then adopted by the Federal g...

Page 10: ...algorithm based on a secure key thus provides a basis for exchanging encrypted computer data by issuing the key used to encipher it to those authorized to have the data Data that is considered sensitive by the responsible authority data that has a high value or data that represents a high value should be cryptographically protected if it is vulnerable to unauthorized disclosure or undetected modif...

Page 11: ...g reasons When considered together Rijndael s combination of security performance efficiency ease of implementation and flexibility make it an appropriate selection for the AES Specifically Rijndael appears to be consistently a very good performer in both hardware and software across a wide range of computing environments regardless of its use in feedback or non feedback modes Its key setup time i...

Page 12: ...ues of security and offers a wide range of alternatives to its customers ranging from a fully open system to an authenticated encrypted air link with dynamic session key assignment Together authentication a proprietary protocol and DES or AES techniques form a powerful bond for protecting the Canopy system and the information that is transmitted over the platform Already it is making way for power...

Page 13: ...0173 www motorola com canopy MOTOROLA and the Stylized M Logo are registered in the US Patent Trademark Office Canopy is a trademark of Motorola Inc All other product or service names are the property of their respective owners Motorola Inc 2003 1 290503 ...

Reviews: