Sorry, I didn't see this reply.
So the content of the KVL, how is it secure ?
1. The KVL will NOT display the key(s), you can ONLY select the CKR/SLN of the key(s) you wish to load into a radio.
2. The memory is volatile. If a KVL is left with out a power source(battery) for a defined period of time, the key(s) will be erased(think of disconnecting a car battery, and then having to reprogram your preset buttons once you reconnect the battery).
3. The KVL has the ability to detect if it's memory is being tampered with, and will self zeroize it's key storage memory.
4. Physical access control and vetting those that have both physical access to and a legitimate need for the use of the KVL.
Depending on the policies of a given agency, pretty secure. Or not.
The security of the contents of the KVL is truly is dependent on the last point. Physical device security.
If you don't have tight physical security of the KVL, then there is a VERY real chance of unauthorized radios being keyloaded, that shouldn't be. Once that unauthorized radio is key loaded, the key is compromised(even if you can't actually recover the key in plain text).
As per my understanding this is where you store the initial key that will unlock all the remaining door for full usage.
Not quite. In a properly designed system, the KVL has the key(UKEK) used to unlock the keys(TEK) that unlock the the 'doors' the radio is authorized to unlock.
Not every radio will be authorized to have every single key, even radios with in the same agency.
Departments like internal affairs(cops that investigate cops), organized crime, domestic terrorism, surveillance and intelligence gathering are usually restricted access with in the agency, where members that are not assigned, can not just walk into these groups work areas.
Members of these groups are going to be vetted and background checked to a much greater degree.
These work areas that are usually a secured, limited access environment, with in a secure, limited access environment. Radios they use will all have unique encryption keys, that ONLY each group has, that NOBODY else will have.
Every radio used by these groups will be inventoried, and specially provisioned with in the KMF, potentially to the extreme of having a unique UKEK, to ensure that ONLY their department radios get rekeyed with their unique keys, in addition to the 'regular' keys used in the over all agency.
Properly securing an agencies communications is a job all on its own. Even a department for a city of a million people, could easily have dozens, or more, unique encryption keys in use.
A ficticous agency could easily have a potential talk group line up something like:
NW Command
NW Tac
NE Command
NE Tac
SW Command
SW Tac
SE Command
SE Tac
Records/Warrant Inquiry North
Records/Warrant Inquiry South
Interop
Pursuit
SRT
K-9 Services
Air Services
Marine Services
Organized Crime Taskforce
Auto Theft Taskforce
Drugs and Guns Taskforce
Warrant Taskforce
Surveillance
Internal affairs
Admin
Simplex(radio to radio, no repeater or trunk system)
If the ficticous agency wanted 100% secure comms, that list is 25(also a common patch key for when encrypted talkgroups, with unique keys are patched together) unique encryption keys alone. Not every radio would have every key, but every radio would be a mix of keys with some being unique, and some being common to all.
For interoperability there could be multiple Interop talkgroups with either the same key, or multiple keys. Agencies that this fictional agency communicate with on a regular basis can have THEIR radios provisioned in the fictional agencies KMF and have their KVL securely loaded with the fictional agencies interop UKEK, and securely receive the key(s) for the interop talk groups. This would require coordination of radio ID's, CKR and talk group ID so that all three are not duplicated to prevent potentially serious issues with duplicate Radio ID's, duplicate CKR's and duplicate Talk Group ID'S.
As you can see, having secure communications is complex, it needs to be planned out, it requires people that are skilled, trained and competent. It requires cooperation and communication at not only a high administration level, but also with the people that are going to actually make it happen. The not only ones planning the fleet map, but the people that are planning the employment of encryption. Each person in that chain is as critical as the other, regardless of the pay grade.
Yet every single day, agencies are doing this, with out problems. Even talking to other agencies securely.
Let see if I did understand properly while you tell me if the radio loose power the original key is lost and need to reload for the radio to resume operation ?
Potentially. There is a check box in XTS/XTL 2500/5000 series (I am most familiar with) CPS, called 'Infinite Key Retention'. If you check the box, the radio, in theory, won't lose its keys, even when left with out power.
If you don't check the box, you have a short period of time where the UCM/MACE/Key storage will retain the key. More than enough time to swap batteries, or reattach a battery that becomes accidently separated, but not a significantly long period of time to be useful to an adversary trying to attempt to somehow extract the keys.