Browse Prior Art Database

CROSS SYSTEM KEY PORTING

IP.com Disclosure Number: IPCOM000009897D
Original Publication Date: 2000-May-01
Included in the Prior Art Database: 2002-Sep-26
Document File: 2 page(s) / 93K

Publishing Venue

Motorola

Related People

Raed Hafez: AUTHOR [+2]

Abstract

Secure two-way radio systems use encryption algorithms and keys to establish their security. Different Secure Systems are based on different proprietary or standard protocols and algorithms.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 50% of the total text.

MOTOROLA

Technical Developments

CROSS SYSTEM KEY PORTING

by Raed Hafez and June Shah

PROBLEM

Secure two-way radio systems use encryption algorithms and keys to establish their security.

Different Secure Systems are based on different proprietary or standard protocols and algorithms.

These systems may become obsolete with time, and customers need to upgrade or deploy new communication systems.

Since typical two-way radio communication systems are large in size, upgrades and deployments occur in phases. When a customer is migrating from one secure system to another, there is a period of time where the customer has duplicates of some equipment. Typically, a Key Variable Loader is used to enter and transfer algorithm keys from the key source to the various secure equipment. In a

~~~~rfAfi~~

M

multi-system environment, a dedicated Key Variable Loader may be required for each system.

However, when the different systems need to co-exist, and communications need to be facilitated across the different systems, algorithm key variables need to be common. Although both systems (old and new) share the same encryption key variables, they have to be duplicated in two different KVL's (Key Variable Loaders) where each KVL supports one version of the system. Keys will be shared from one KVL to another using manual methods.

In order to manually enter duplicate keys into different equipment, these keys need to be tracked on paper. This process is cumbersome due to the reentry of lengthy keys and allows for human errors.

It is als...