background image

6

Decrypting cipher converts the data back to its original form called plain text.
The algorithms for DES described in the DES standard specifies both enciphering
and deciphering operations which are based on a binary number called a key.

A DES key consists of 64 binary digits ("0"s or "1"s) of which 56 bits are
randomly generated and used directly by the algorithm.  The other 8 bits, which
are not used by the algorithm, may be used for error detection.  The 8 error
detecting bits are set to make the parity of each 8-bit byte of the key odd, i.e.,
there is an odd number of "1"s in each 8-bit byte

2

.  Authorized users of encrypted

computer data must have the key that was used to encipher the data in order to
decrypt it.  The encryption algorithms specified in the standard are commonly
known among those using the standard.  The cryptographic security of the data
depends on the security provided for the key used to encipher and decipher the
data.

Data can be recovered from cipher only by using exactly the same key used to
encipher it.  Unauthorized recipients of the cipher who know the algorithm but do
not have the correct key cannot derive the original data algorithmically.
However, it may be feasible to determine the key by a brute force “exhaustion
attack.”  Also, anyone who does have the key and the algorithm can easily
decipher the cipher and obtain the original data.  A standard algorithm based on a
secure key thus provides a basis for exchanging encrypted computer data by
issuing the key used to encipher it to those authorized to have the data.

Data that is considered sensitive by the responsible authority, data that has a high
value, or data that represents a high value should be cryptographically protected if
it is vulnerable to unauthorized disclosure or undetected modification during
transmission or while in storage.”

Advanced Encryption Standard (AES)

AES Standard is the follow-up to DES and is the result of an exhaustive evaluation by the
National Institute of Standards and Technology that began in 1997 with a notice
soliciting an unclassified, publicly disclosed encryption algorithm that would be available
royalty-free worldwide. Following the submission of 15 candidate algorithms and three
publicly held conferences to discuss and analyze the candidates, the field was narrowed
to five candidates. NIST continued to study all available information and analyses about
the candidate algorithms, and selected one of the algorithms, the Rijndael algorithm, to
propose for the AES.  The Rijndael algorithm is a variable length block cipher, but its
implementation in AES is 128 bits.  In decimal terms, this means that there are
approximately:

3.4 x 10

38

 possible 128-bit keys;

                                                

2

 

Sometimes keys are generated in an encrypted form. A random 64-bit number is generated and defined to

be the cipher formed by the encryption of a key using a key encrypting key.  In this case the parity bits of
the encrypted key cannot be set until after the key is decrypted.

Содержание Wireless Broadband Platform

Страница 1: ...i Security and the Motorola Canopy Wireless Broadband Platform Advanced Security Techniques ...

Страница 2: ...y 2 Security Features of the Canopy System 2 Canopy s Proprietary Protocol 3 Authentication 3 Key Management 4 Encryption 5 Data Encryption Standard DES 5 Advanced Encryption Standard AES 6 Summary 8 List of Tables Table 1 The Authentication Process 4 Table 2 Canopy Key Management 4 Table 3 Methods of Encryption and Their Associated Keys 7 ...

Страница 3: ...odule DES Data Encryption Standard DHCP Dynamic Host Configuration Protocol FIPS Federal Information Processing Standards IP Internet Protocol LAN Local Area Network NAT Network Address Translation QoS Quality of Service SM Subscriber Module SNMP Simple Network Management Protocol SQL Structured Queary Language TIA Telecommunications Industry Association ...

Страница 4: ... available solution This test is not a determination of product quality or correctness nor does it ensure compliance with any federal state or local requirements Motorola does not warrant products other than its own strictly as stated in Motorola s product warranties MOTOROLA and the Stylized M Logo are registered in the US Patent Trademark Office Canopy is a trademark of Motorola Inc All other pr...

Страница 5: ...ty and the Motorola Canopy Broadband Wireless Platform offers a snapshot of some of the security issues being faced by the wireless broadband industry as well as the safeguards that Motorola is employing in the Canopy platform to ensure the security and integrity of this advanced system for our customers WHY ARE SECURITY MEASURES NECESSARY When the Internet was first introduced there was little co...

Страница 6: ...e network These include Access Point AP Subscriber Module SM Backhaul BH Module Cluster Management Module CMM Bandwidth and Authentication Manager BAM The Canopy system security does not include elements outside of the wireless transport such as Client Computer Wireless Modems Local Area Networks Routers Printers Servers Various Network Peripheral Equipment Protecting equipment outside of the Cano...

Страница 7: ...r the air is scrambled into 64 byte data packages thus providing an additional obstacle to unauthorized decoding Finally the directionality of the Canopy system transmissions impedes eavesdropping In other words the proprietary air interface presents a major hurdle for unauthorized parties Of course the Canopy system s security is not based merely on secrecy of its air interface AUTHENTICATION Cle...

Страница 8: ...ion 8 If the results do not agree or the SM is not in the database the BAM sends the AP a message denying authentication and the AP sends the SM a message to lock itself out from that AP for 15 minutes before retrying KEY MANAGEMENT The Canopy system uses an ESN two keys and a random number for authentication Table 2 details the functionality of each of these along with the random number Table 2 C...

Страница 9: ...tem provides for AES for customers who require the most secure networks available These encryption techniques are transparent to network firewalls Dynamic Host Configuration Protocol DHCP servers and Network Address Translation NAT devices Data Encryption Standard DES DES is an encryption standard that uses an encryption technique developed in the mid 1970s by IBM and then adopted by the Federal g...

Страница 10: ...algorithm based on a secure key thus provides a basis for exchanging encrypted computer data by issuing the key used to encipher it to those authorized to have the data Data that is considered sensitive by the responsible authority data that has a high value or data that represents a high value should be cryptographically protected if it is vulnerable to unauthorized disclosure or undetected modif...

Страница 11: ...g reasons When considered together Rijndael s combination of security performance efficiency ease of implementation and flexibility make it an appropriate selection for the AES Specifically Rijndael appears to be consistently a very good performer in both hardware and software across a wide range of computing environments regardless of its use in feedback or non feedback modes Its key setup time i...

Страница 12: ...ues of security and offers a wide range of alternatives to its customers ranging from a fully open system to an authenticated encrypted air link with dynamic session key assignment Together authentication a proprietary protocol and DES or AES techniques form a powerful bond for protecting the Canopy system and the information that is transmitted over the platform Already it is making way for power...

Страница 13: ...0173 www motorola com canopy MOTOROLA and the Stylized M Logo are registered in the US Patent Trademark Office Canopy is a trademark of Motorola Inc All other product or service names are the property of their respective owners Motorola Inc 2003 1 290503 ...

Отзывы: