Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

METHODS TO SUPPORT MULTIPLE ENCRYPTION ALGORITHMS IN A TRUNKED RADIO SYSTEM

IP.com Disclosure Number: IPCOM000008056D
Original Publication Date: 1997-Mar-01
Included in the Prior Art Database: 2002-May-15
Document File: 2 page(s) / 103K

Publishing Venue

Motorola

Related People

Walt Anderson: AUTHOR [+2]

Abstract

In secure, multi-key & multi-algorithm trunked radio systems, infrastructure equipment and sub- scriber radios must have matching encryption algo- rithm types in order to permit secure communica- tions between radios and consoles or between radios and telephone interconnect devices. Many different encryption algorithm types are available, and today's radios and infrastructure units can only support up to two of these algorithms. The problem solved by this invention is that in today's systems, the number and type of different encryption algo- rithms permitted to operate in the system is limited to the maximum number (in this case, two) that can he supported by any given infrastructure Digital Interface Unit (DIU), and each of the DIUs must be equipped with the same encryption algorithms. As customer's needs for security continue to expand, the ability to support multiple encryption algorithms provides important opportunities for flexibility and inter-operability.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 50% of the total text.

Page 1 of 2

m MOTOROLA Technical Developments

METHODS TO SUPPORT MULTIPLE ENCRYPTION ALGORITHMS IN A TRUNKED RADIO SYSTEM

by Walt Anderson and Sally Jestice

THE PROBLEM THE SOLUTIONS

  In secure, multi-key & multi-algorithm trunked radio systems, infrastructure equipment and sub- scriber radios must have matching encryption algo- rithm types in order to permit secure communica- tions between radios and consoles or between radios and telephone interconnect devices. Many different encryption algorithm types are available, and today's radios and infrastructure units can only support up to two of these algorithms. The problem solved by this invention is that in today's systems, the number and type of different encryption algo- rithms permitted to operate in the system is limited to the maximum number (in this case, two) that can he supported by any given infrastructure Digital Interface Unit (DIU), and each of the DIUs must be equipped with the same encryption algorithms. As customer's needs for security continue to expand, the ability to support multiple encryption algorithms provides important opportunities for flexibility and inter-operability.

  The problem can be solved by providing the system controller with knowledge of the encryption algorithm requested for the call and with knowledge of the encryption algorithms supported by each DIU. When a call request is made, the system con- troller is thus able to explicitly select a DIU which supports the requested algorithm; this removes the limitation of how many different algorithms that can be utilized in a system, and removes the limita- tion that all DIUs be identically equipped.

  Alternatively, the problem could he solved by mapping encryption algorithms to key set identi- tiers. The system controller is provided with knowl- edge of the key set identifier requested for the call and with knowledge of the key sets supported by each DIU. When a call request is made, the system controller is thus able to explicitly select a DIU which supports the requested key set; again this removes the limitation of how many different algo- rithms that can be utilized in a system and removes the limitation that all DIUs be identically equipped.

SYSTEM BACKGROUND

  In today's trunked radio systems, when a...