Figure 3-14. Traffic Decryption Key Negotiation - Comtech EF Data DMD1050TS Installation And Operation Manual

Satellite modem board
Table of Contents

Advertisement

3.20.1.2 Key Agreement Algorithm
The key agreement algorithm used to negotiate a shared secret is the Ephemeral Unified Model,
Elliptic Curve Cryptography Cofactor Diffie-Hellman C(2,0,ECC CDH) as specified in the elliptic
curve parameters section of NIST SP 800-56A(3).
3.20.1.2.1
Once the shared secret has been negotiated, the TEK is generated from the shared secret using
the Concatenation Key Derivation Function (KDF), as specified in NIST SP 800-56A, Section
5.8.1(3). All hashing algorithms use SHA-512, as defined in FIPS 180-2(4).
Theory of Operation

Figure 3-14. Traffic Decryption Key Negotiation

Key Derivation
DMD1050TS Satellite Modem Board
3–41
Revision 1
MN-DMD1050TS

Advertisement

Table of Contents
loading

Table of Contents