M00002668
New product
TIA-102.AACB 2002 Edition, November 1, 2002 Project 25 - Over-the-Air Rekeying (OTAR) Opertional Description
In stock
Warning: Last items in stock!
Availability date: 09/09/2021
Description / Abstract:
Many of the parts of a land mobile radio communications system
will use encryption to protect the information that is sent through
the system. The encryption algorithms require keys in order to
protect the confidentiality of this information. The process by
which these encryption keys are generated, stored, protected,
transferred, loaded, used and destroyed is known as key management.
These keys must be protected from disclosure and require updating
or replacement in order to maintain system security. This is often
accomplished manually. However, the most convenient way to do this
is by electronically sending keys from a key management facility
(KMF) to the destination equipment. This involves sending keys over
the air and this procedure is referred to as Over-the-Air-Rekeying
(OTAR). OTAR is a method of encrypting and sending the encryption
keys and other related key management messages through an air
interface in such a way that they are protected from disclosure,
and, in some cases, unauthorized modification.
This document describes the basic keying concepts for protected
radios, including those fundamental key management concepts related
to OTAR. OTAR is an application layer process. Peer processes exist
in the key management facility (KMF) and at the mobile radios. The
KMF is responsible for providing OTAR functions for the set of
mobile radios within its jurisdiction.
The document gives sample operational procedures for the OTAR of
radios in a protected system. The interaction between the KMF and
mobile radios that is necessary to provide various key management
services is described. The operational procedures delineated in
this document include both a basic and an advanced set of
procedures. No advanced public key OTAR procedures have been
defined for Data Encryption Standard applications, and are not
discussed in this document. An OTAR protocol document for the
particular encryption algorithm being used describes which messages
require encryption, message authentication and replay
protection.