List of tables – Motorola Wireless Broadband Platform User Manual

Page 2

Advertising
background image

ii

T

ABLE OF

C

ONTENTS

Introduction

......................................................................................................................... 1

Why Are Security Measures Necessary?

............................................................................ 1

Clear Text Transmissions

............................................................................................... 1

Passive Monitoring

......................................................................................................... 2

End-to-End Security

........................................................................................................ 2

Security Features of the Canopy System

............................................................................ 2

Canopy’s Proprietary Protocol

........................................................................................ 3

Authentication

................................................................................................................. 3

Key Management

............................................................................................................ 4

Encryption

....................................................................................................................... 5

Data Encryption Standard (DES)

................................................................................ 5

Advanced Encryption Standard (AES)

....................................................................... 6

Summary

............................................................................................................................. 8

List of Tables

Table 1. The Authentication Process

................................................................................. 4

Table 2. Canopy Key Management

.................................................................................... 4

Table 3. Methods of Encryption and Their Associated Keys

............................................. 7

Advertising