HS Series Security Overview
Encryption algorithms are complex mathematical equations that use a
number, called a key, to encrypt data before transmission. This is done
so that unauthorized persons who may intercept the transmission cannot
access the data. In order to decrypt the transmission, the decoder must
use the same key that was used to encrypt it. The decoder will perform the
same calculations as the encoder and, if the key is the same, the data will
be recovered.
The HS Series uses the CipherLinx? algorithm, which is based on
Skipjack, a cipher designed by the U.S. National Security Agency (NSA).
At the time of this writing, there are no known cryptographic attacks on the
full Skipjack algorithm. Skipjack uses 80-bit keys to encipher 64-bit data
blocks. The CipherLinx? algorithm uses Skipjack in a provably secure
authenticated encryption mode both to protect the secrecy of the data and
ensure that it is not modified by an adversary. 8 bits of data are combined
with a 40-bit counter and 80 bits of integrity protection before being
encrypted to produce each 128-bit packet.
Preamble
128-Bit Encrypted Data
RX
Noise Logic
Integrity Check
Data
Counter
Balancing Filter Filter
80 bits
8 bits
40 bits
Figure 12: HS Series Data Structure
There are several methods an attacker may use to try to gain access to the
data or the secured area. Because a key is used to interpret an encrypted
message, trying to find the key is one way to attack the protected
message. The attacker would either try using random numbers or go
through all possible numbers sequentially to try to get the key and access
the data. Because of this, it is sometimes believed that a larger key size will
determine the strength of the encryption. This is not entirely true. Although
it is a factor in the equation, there are many other factors that need to be
included to maintain secure encryption.
One factor is the way that the underlying cipher (in the case of the
CipherLinx? algorithm, Skipjack) is used to encrypt the data. This is
referred to as the cipher’s “mode of operation.” If a highly secure cipher
is used in an insecure mode, the resulting encryption will be insecure. For
example, some encryption modes allow an adversary to combine parts
of legitimate encrypted messages together to create a new (and possibly
malicious) encrypted message. This is known as a “cut-and-paste” attack.
– 12 –
相关PDF资料
MDEV-USB-QS KIT DEV MASTER USB QS SERIES
MF11-0010005 THERMISTOR NTC 100OHM -+5% PROBE
MF51E103F3950C THERMISTOR NTC PREC -+1% 3950K
MG-300-A-9V-R SENSOR DIGITAL GAUGE 300PSI LCD
MG-5000-B-MD-R SENSOR 5000 PSI 4-20 MA 1/8 NPT
MG1-1000-A-9V-R SENSOR DIGITAL GAUGE 1000PSI LCD
MGA-300-A-9V-R SENSOR DIGITAL GAUGE 300PSI LCD
MGSF1N02LT1 MOSFET N-CH 20V 750MA SOT-23
相关代理商/技术参数
MDEV-LICAL-MS 功能描述:其他开发工具 MS Series Master Dev Kit RoHS:否 制造商:Parallax 产品:ELEV-8 Hex Upgrade Kits 类型:Robotics 工具用于评估:ELEV-8 Quadcopter 工作电源电压:
MDEV-LICAL-MS-ES 功能描述:其他开发工具 MS Series Master Dev Kit w/ ES RF Modules RoHS:否 制造商:Parallax 产品:ELEV-8 Hex Upgrade Kits 类型:Robotics 工具用于评估:ELEV-8 Quadcopter 工作电源电压:
MDEV-LICAL-MT 功能描述:其他开发工具 MT Series Master Dev Kit RoHS:否 制造商:Parallax 产品:ELEV-8 Hex Upgrade Kits 类型:Robotics 工具用于评估:ELEV-8 Quadcopter 工作电源电压:
MDEV-USB-QS 功能描述:界面开发工具 QS Master Dev Sys RoHS:否 制造商:Bourns 产品:Evaluation Boards 类型:RS-485 工具用于评估:ADM3485E 接口类型:RS-485 工作电源电压:3.3 V
MDF005 制造商:MIC 制造商全称:MIC GROUP RECTIFIERS 功能描述:SURFACE MOUNT BRIDGE
MDF01 制造商:MIC 制造商全称:MIC GROUP RECTIFIERS 功能描述:SURFACE MOUNT BRIDGE
MDF02 制造商:MIC 制造商全称:MIC GROUP RECTIFIERS 功能描述:SURFACE MOUNT BRIDGE
MDF-023 制造商:Power Dynamics Inc 功能描述: