Appendix A - Network Transmission Security; Keying Scheme; Figure 15-1 Overall Keying Scheme - L3 Communications MPM-1000A Operator's Manual

Ruggedized ip modem
Table of Contents

Advertisement

MPM-1000A Operator Manual
15 APPENDIX A – NETWORK TRANSMISSION SECURITY

15.1 Keying Scheme

Figure 15-1 Overall Keying Scheme depicts the keying scheme used by the Modem in a
NCW network. A "split-knowledge" keying concept is employed, wherein two (2)
independent, externally supplied, keying parameters are required to produce the
operational message encryption key material (MEKs). The two (2) parameters are a
message seed key (MSK) and a passphrase. The seed key is retained by the Modem in
non-volatile storage and survives a power cycling of the Modem. The passphrase,
MEKs and all derived intermediate keying parameters are stored in volatile memory and
perish upon removal of Modem power. Because both the MSK and TRANSEC
Passphrase are needed to derive operational keys, an idle (unpowered) Terminal will
not yield operational keys if compromised. Upon the reapplication of power, you must
enter the TRANSEC Passphrase in order to re-establish the operational TRANSEC
keys.
A1 = Key Derivation Function (1000-7124)
A2 = Traffic Encryption/Decryption (AES-256)
SSH = Secure Shell Protocol (encrypted/authenticated tunnel)
MEK = Message Encryption Key
NCT = Network Control Terminal
NT = Network Terminal
P a s s p h r a s e
S e e d K e y (M S K )
P a s s p h r a s e
S e e d K e y
(In itia l o n ly )
N C T C o n tr o lle r
M o d e m
C o n tr o l
S S H
S o ftw a re
N e tw o rk D a ta T r a ffic
N T C o n tr o lle r
M o d e m
C o n tr o l
S S H
S o ftw a re
N e tw o rk D a ta T r a ffic

Figure 15-1 Overall Keying Scheme

N C T M P M -1 0 0 0
S S H
(M S K O T A R )
N T M P M -1 0 0 0 (s )
S S H
(M S K O T A R )
15-1
1000-7075 Rev E
M E K
0
M E K
1
A 1
M E K
3 1
A 2
R F L in k
M E K
0
M E K
1
A 1
M E K
3 1
A 2

Advertisement

Table of Contents
loading

Related Products for L3 Communications MPM-1000A

Table of Contents