8
internal round structure appears to have good potential to benefit from instruction-
level parallelism.”
5
AES is commercially available as an option to the Canopy system and can be very
effectively used with the BAM.
S
UMMARY
The wireless broadband industry has made significant advancements in the last several
years both in terms of capabilities and market acceptance. For this trend to continue,
however, these wireless networks must embody the types of security provisions outlined
in this paper.
Motorola has taken a very proactive stance on the issues of security and offers a wide
range of alternatives to its customers ranging from a fully open system to an
authenticated/encrypted air link with dynamic session key assignment. Together,
authentication, a proprietary protocol and DES or AES techniques form a powerful bond
for protecting the Canopy system and the information that is transmitted over the
platform. Already, it is making way for powerful new sets of applications for security
focused users. We anticipate that as the platform continues to proliferate these types of
applications will be the basis for continued growth of wireless broadband solutions.
Additional product information is located at the Canopy website at
www.motorola.com/canopy
.
5
National Institute of Standards & Technology.