NXDN® Is a Registered Trademark of JVC KENWOOD Corporation and Icom Incorporated

NXDN® Is a Registered Trademark of JVC KENWOOD Corporation and Icom Incorporated

® NXDN NXDN Technical Specifications Part 1: Air Interface Sub-part D: Security NXDN TS 1-D Version 1.3 November 2011 NXDN Forum Part 1-D Security Ver.1.3 Contents 1. Introduction........................................................................................................................................................1 2. References........................................................................................................................................................1 3. Abbreviations.....................................................................................................................................................1 4. Security .............................................................................................................................................................3 4.1. Outline ......................................................................................................................................................3 4.2. Type of Encryption....................................................................................................................................3 4.3. Authentication Method..............................................................................................................................4 5. Encryption Procedure........................................................................................................................................5 5.1. Layer for Encryption..................................................................................................................................5 5.2. Encryption Processing..............................................................................................................................5 5.3. Encryption Algorithm.................................................................................................................................6 5.3.1. Scramble Encryption ........................................................................................................................6 5.3.2. DES Encryption................................................................................................................................6 5.3.2.1. OFB Mode....................................................................................................................................6 5.3.2.2. 64-bit Initialization Vector Generation ..........................................................................................8 5.3.3. AES Encryption ................................................................................................................................9 5.3.3.1. OFB Mode....................................................................................................................................9 5.3.3.2. 128-bit Initialization Vector Generation ........................................................................................9 5.4. Procedure for Encrypted Call..................................................................................................................11 5.4.1. Information Element in Encrypted Call ...........................................................................................11 5.4.2. Scope of Encryption .......................................................................................................................11 5.4.3. Bit Allocation of Initialization Vector................................................................................................12 5.4.4. Encrypted Voice Calls ....................................................................................................................12 5.4.4.1. Voice Calls with Scramble Encryption........................................................................................12 5.4.4.2. Voice Calls with DES/AES Encryption .......................................................................................13 5.4.5. Encrypted Data Calls......................................................................................................................17 5.4.5.1. Data Calls with Scramble Encryption .........................................................................................17 5.4.5.2. Data Calls with DES/AES Encryption.........................................................................................17 5.4.6. Simultaneous Data Call..................................................................................................................19 6. Authentication Procedure ................................................................................................................................20 6.1. Layer for Authentication..........................................................................................................................20 6.2. Authentication Protocol...........................................................................................................................20 6.3. Cryptography Technique ........................................................................................................................21 6.3.1. Authentication Parameter Generator..............................................................................................21 6.3.2. Authentication Value Encoder/Decoder..........................................................................................21 7. Appendices......................................................................................................................................................23 7.1. ESN ........................................................................................................................................................23 7.1.1. ESN Format ...................................................................................................................................23 7.2. Test Vectors ...........................................................................................................................................24 7.2.1. Voice Channel Test Vectors...........................................................................................................24 7.2.1.1. Voice Channel with Scrambled Encryption ................................................................................24 7.2.1.2. Voice Channel with DES Encryption ..........................................................................................25 7.2.1.3. Voice Channel with AES Encryption ..........................................................................................27 7.2.2. User Data Channel Test Vectors....................................................................................................28 Copyright © 2007-2012 JVC KENWOOD Corporation and Icom Incorporated i Part 1-D Security Ver.1.3 7.2.2.1. User Data Channel with Scramble Encryption ...........................................................................28 7.2.2.2. User Data Channel with DES Encryption ...................................................................................29 7.2.2.3. User Data Channel with AES Encryption ...................................................................................29 7.2.3. Initializtion Vector Generation Value ..............................................................................................29 8. Revision History ..............................................................................................................................................30 Figures Figure 5.1-1 Layer for Encryption Protocol .............................................................................................................5 Figure 5.2-1 Encryption Processing Diagram .........................................................................................................5 Figure 5.3-1 Scramble Encryption Algorithm ..........................................................................................................6 Figure 5.3-2 DES Encryption Algorithm ..................................................................................................................7 Figure 5.3-3 64 bits IV Generator ...........................................................................................................................8 Figure 5.3-4 AES Encryption Algorithm ..................................................................................................................9 Figure 5.3-5 128 bits IV Generator .......................................................................................................................10 Figure 5.4-1 Bit Allocation of Initialization Vector..................................................................................................12 Figure 5.4-2 Relationship between PN sequnece and VCH in Scramble Encryption ...........................................13 Figure 5.4-3 Relationship between DES OFB output data and VCH ....................................................................15 Figure 5.4-4 Relationship between AES OFB output data and VCH ....................................................................15 Figure 5.4-5 Usage of Initialization Vector ............................................................................................................16 Figure 5.4-6 Relationship between PN sequence and UDCH in Scramble Encryption.........................................17 Figure 5.4-7 Relationship between PN sequence and UPCH in Scramble Encryption.........................................17 Figure 5.4-8

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    34 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us