Introduction... 1 Why Are Security Measures Clear Text Transmissions Passive Monitoring ... 2 End-to-End Security... 2 Security Features of the Canopy System Canopy’s Proprietary Protocol... 3 Authentication... 3 Key Management ... 4 Encryption... 5 Data Encryption Standard Advanced Encryption Standard (AES) Summary ...
List of Acronyms AES...Advanced Encryption Standard AP ...Access Point BAM ...Bandwidth and Authentication Manager BH...Backhaul Module CMM...Cluster Management Module DES ...Data Encryption Standard DHCP ...Dynamic Host Configuration Protocol FIPS...Federal Information Processing Standards IP ...Internet Protocol LAN ...Local Area Network NAT ...Network Address Translation QoS...Quality of Service SM...Subscriber Module SNMP...Simple Network Management Protocol...
ASSIVE ONITORING As mentioned previously, it is relatively easy to monitor clear text transmissions over an IP network. Unfortunately, most of the time invaders are not easily detected. This is because monitoring of the traffic is performed using passive devices that do not transmit any data of their own.
Today, the Canopy system incorporates a flexible security model that supports a wide variety of system configurations ranging from a fully open system to an authenticated/encrypted air link with dynamic session key assignment. The Canopy system uses industry proven authentication and encryption technologies to ensure that the service provider maintains control of the network.
Table 1. The Authentication Process Step When an SM attempts to enter the Canopy network it sends a registration request to the AP. The AP then sends an authentication request to the BAM. The BAM generates a 128 bit random number that is sent to the SM as a challenge.
Key/Number Session Key Random Number Of the three numbers presented in Table 2, only the Authentication Key is settable by the network operator and it must be set both in the BAM and in the SM. Further information about Canopy’s authentication process is detailed in Bandwidth and Authentication (BAM) User Guide.
Decrypting cipher converts the data back to its original form called plain text. The algorithms for DES described in the DES standard specifies both enciphering and deciphering operations which are based on a binary number called a key. A DES key consists of 64 binary digits ("0"s or "1"s) of which 56 bits are randomly generated and used directly by the algorithm.
In comparison, DES keys are 56 bits long, which means there are approximately 7.2 x possible DES keys. Thus, there are on the order of 10 keys than DES 56-bit keys. In the late 1990s, specialized "DES Cracker" machines were built that could recover a DES key after a few hours.
Motorola has taken a very proactive stance on the issues of security and offers a wide range of alternatives to its customers ranging from a fully open system to an authenticated/encrypted air link with dynamic session key assignment.
Page 13
Motorola Canopy 50 E Commerce Drive Schaumburg, IL 60173 www.motorola.com/canopy MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. Canopy is a trademark of Motorola, Inc. All other product or service names are the property of their respective owners.