kayn1n32008
ØÆSØ Say it, say 'ENCRYPTION'
No worries. In a P25 system, the keys are always securely stored. With in the KMF, The keys are stored in volatile memory, that is designed to detect tampering and when it does, it will erase the key material. When sending the key material over the air during re-keying, the key material is encrypted using the UKEK(a separate encryption key) prior to being transmitted.Ya getting mix up in the acronym.
The questions is all about the inherent chicken and egg situation associated with private key distribution and storage.
Yes. The key is stored with in the radio in secure and volatile memory, it is also encrypted. The radio will decrypt the key to make use of it with in its own processors and RAM.At some point the key need to be in the clear for use.
There is also a great deal of development to ensure the keys are not leaked or readable from the subscribers.There is a great deal of technique and work around in that.
No, the UKEK is an encryption key used to convert the clear text key material to an encrypted text to be sent to the subscriber. It doesn't store anything.For instance the UKEK store the key.
That is exactly what the UKEK is used for.For security reasons I would encrypt the key for transport
Again, there are methods to detect those kinds of things, and when it is detected, the keys are erased(zeroized) to prevent the key material from being disclosed in clear text. The KVL, KMF and subscribers are designed to NOT allow keys to be read out in clear text.or the key can be extracted from the transport device by anyone gaining access to it.
Also, physical security of the devices are also a part of keeping the key material from disclosure. Minimizing the number of people that have access to the KMF, KVL and subscribers, having access control to those devices, and having an auditable access list to both the KMF and KVL(S) all make the clear text disclosure of key material as low as possible.
The radio has an encryption key to decrypt the encrypted keys.Ok so if the key is encrypted how is the radio access it for use ?
Radios can be configured to require for code to unlock them. If the correct unlock code is not entered in a set number of tries, the keys are zeroized.Is the operators require to enter a code to unlock the key for operation?
the UKEK is not a transfer device. It is an encryption key used to encrypt the TEK for transmission from a KMF to a subscriber radio.Or the key is simply decrypted when transfer from the UKEK to the radio?
The KMF is a part of the fixed network infrastructure. It is not physically accessed to use it, but is a part of the network. It is also in a physically secure location owned by the network owner with other fixed network infrastructure.And if it the case how is the key unlock for transfer and by who ?
When the radio is updated with new TEK during OTAR, the new TEK are decrypted by the subscriber radio using the preloaded UKEK, when they are received, then stored with in the radio.
There is no user input in this process, other than initiating the OTAR process. Once initiated, the re-keying process occurs with out further user input.
Ultimately, the UKEK comes first, it will be generated by and stored in the KMF.As I mentioned crypto is a chicken and egg thing.
Then the UKEK is loaded into a KVL.
Then a radio is programmed with the radio system parameters to make the radio operate on the network. The radio also is provisioned in the KMF to be autorised to receive TEK(s) from the KMF.
Then the subscriber is connected to the KVL and the UKEK is loaded into the subscriber.
The subscriber then, by the technician, initiates OTAR, where the subscriber requests the TEK(s) from the KMF.
The KMF validates the radio, encrypts the TEK(s) using the UKEK and transmits them to the subscriber.
The subscriber receives the encrypted TEK(s), decrypts them using the UKEK and stores them in the radio.
At no point are the TEK(s) in clear text, that they can be captured so long as the key loaded device is not in physical control of someone who desires to have the key material in clear text. If a keyloaded device is lost or stolen, it can be remotely inhibited, and zeroized if it is with in the coverage of the system it is used on.
If the device is turned off, the netowrk operator can send an inhibit amd zeroize command, that will be executed if the radio registers on the network. Keys are stored in volatile memory, and can self erase if the device is with out power. The memory the keys are held in can also self erase if it detects its being tampered with as well.
Is it possible to recover keys? Yes, but the likely hood of it being accomplished is very very low.
If a device is lost or stolen, once the inhibit and zeroize command is sent, the remaining fleet can easily and quickly re-keyed. When the lost or stolen device next registers on the network, it will immediately be inhibited, and all keys erased. It will not be able to be re-keyed, until a new UKEK is loaded by physically being in possession of a authorized technician, that has the correct UKEK in a KVL, and the new UKEK is loaded into the subscriber.
Last edited: