E
NCRYPTION
O
VERVIEW OF ENCRYPTION
Table 15: Properties of a secure key in CES-128 and AES-256 encryption
NOTE:
NOTE:
Secure keys may also be entered via the user interface of the control point, if
permitted. You can also replace a secure key with a new string of characters. You
cannot read existing secure keys.
CAUTION:
Related links:
320
Properties
Length of key
Characters
Codan's KMS may be used to generate secure keys and to fill the CES
and AES encryptors.
VCOM is used to provide virtual COM ports for programming secure
keys via KMS/KFS over the USB connector on the control point.
If you edit a key, you must make the same change to the same key in
all other transceivers that want to communicate securely with this
station.
Adding a secure key on page 325
Selecting a secure key on page 80
Editing a secure key on page 327
Setting the CES key prefix on page 343
Setting the digital key prefix on page 352
Viewing the COM port setting in VCOM on page 303
CES-128 Voice
Encryption
Index 1: 8 digits
Index 2 to 98: 16 digits
Numeric
AES-256 Digital
Voice/Data Encryption
64 characters
Hexadecimal (A–F, 0–9)
E
™ T
R
NVOY
RANSCEIVER
EFERENCE
M
ANUAL
Need help?
Do you have a question about the Envoy and is the answer not in the manual?