INTRODUCTION
_________________________________________________________________________________________________________
2-7
COM-00-21-03 OCTOBER 2021
Version No.: A
Airlink uses the Privacy and Key Management Protocol version 2 (PKMv2) for secure key
management transfer and exchange. The authorization key is generated and is used to secure
the 3-way handshake of the traffic key distribution. The process is secured, encrypted, and
authenticated through all stages using RSA-4096, Cipher-based Message Authentication Code
(CMAC), Hash-based Message Authentication Code (HMAC), and AES-256 – CCM.
Passwords are encrypted with the device public key. Private key is stored in secured storage
provided by the chip. All keys in the system, except the private-public keys, are randomly
generated and with a configurable lifecycle. Hardware-generated random number generator is
used by all cryptographic algorithms and hashing functions.
2.6
Detection and Monitoring
Airlink devices include several security mechanisms such as secure boot (hardware-enforced
root-of-trust, customer programmable keys, and OTP data, support for takeover protection, IP
protection, and anti-rollback protection), strong cryptography algorithms, trusted execution
environment support (firewall support for isolation, secure DMA path and interconnect and
secure watchdog/timer/IPC) and more.