Table 3-12. Encryption Algorithms And Corresponding Kit Numbers - Motorola APX 5000 Service Manual

Hide thumbs Also See for APX 5000:
Table of Contents

Advertisement

3-58
As shown in
Figure 3-41
• MACE IC
• Key Loading
• Key Retention
• Tamper
• Key Zeroize.
3.2.8.1 MACE IC
The encryption module uses the MACE IC and an encryption key variable to perform its encode/
decode function. The encryption key variable is loaded into the MACE IC, via the GCAI (side)
connector, from a hand-held, key variable loader (KVL). The MACE IC contains the particular
encryption algorithm purchased.
kit numbers.
Once the MACE IC has its encryption keys and algorithm, it communicates with the radio' s host
processor (OMAP) through the Synchronous Serial Interface (SSI) bus. Both commands and audio
(clear and encrypted) are sent through the SSI bus. A communications failure between the host
processor and the secure module will be indicated as an ERROR 09/10 message on the display.
Table below lists the encryption algorithms and their corresponding kit numbers.

Table 3-12. Encryption Algorithms and Corresponding Kit Numbers

KIT Number
APX 5000/APX 6000/APX 6000XE/SRX 2200
NNTN8171_
APX 5000/APX 6000/APX 6000XE/SRX 2200
NNTN8172_
APX 5000/APX 6000/APX 6000XE/SRX 2200
NNTN8173_
APX 5000/APX 6000/APX 6000XE/SRX 2200
NNTN8174_
APX 5000/APX 6000/APX 6000XE/SRX 2200
NNTN8175_
APX 5000/APX 6000/APX 6000XE/SRX 2200
NNTN8176_
APX 5000/APX 6000/APX 6000XE/SRX 2200
NNTN8177_
APX 5000/APX 6000/APX 6000XE/SRX 2200
NNTN8178_
The MACE IC relies on a 4 MHz clock source provided by the CPLD, the clock is connected to
MACE's XIN pin (U2510-P5).
3.2.8.2 Key Loading / Fail
Key variables are loaded into the MACE IC through the keyfail line. The signal originates from the
GCAI connector (pin 8 of J2004) and is passed through the expansion board to the VOCON board.
The signal is then selected by a multiplexer (U4003) controlled by CPLD output, KEYFAIL_CTRL,
and the signal is routed back to the expansion board to the MACE's KYLD pin (U2510-B10).
above, the encryption design consists of 5 blocks:
Table 3-12
lists the encryption algorithms and their corresponding
Theory of Operation
Description
DVP-XL KIT
DVP-XL KIT with Bluetooth
AES KIT
AES KIT with Bluetooth
DES/DES-XL/DES-OFB KIT
DES/DES-XL/DES-OFB KIT with Bluetooth
NO ALGO BASIC VERSION
NO ALGO BASIC VERSION with Bluetooth
: Controller

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Apx 6000xeApx 6000Srx 2200

Table of Contents