
Data Encryption Overview
117386-A Rev. A
1-5
Figure 1-1. Hierarchy of Encryption Keys
The keys are the
• Node Protection Key (NPK). It encrypts the LTSS.
• Long-Term Shared Secret (LTSS). It is the sourcefor the Master Encryption
Key.
• Master Encryption Key (MEK). It encrypts the Traffic Encryption Key.
• Traffic Encryption Key (TEK). The TEK encrypts the data that travels across
the network.
Random Number Generators (RNGs)
RNGs generate values for the keys. These values are statistically random. An
RNG uses as its source a
seed
that you supply. Refer to “
Creating Seeds” in
Cha
pter 3 for instructions.
Site Manager uses two of the RNGs to generate NPKs and LTSSs. The router uses
the third RNG to generate TEKs.
WEP0001A
Billerica: NPK
Santa Clara: NPK
Billerica-SC: LTSS
Billerica-NY: LTSS
.....
1
2
12
12
23
24
13
FR or PPP
Site Manager
Santa Clara
Billerica
2
NPK
1
NPK
LTSS
LTSS
LTSS
12
12
13
14
LTSS
LTSS
LTSS
TEK Data
KEK=(LTSS , TIME)
Comentarios a estos manuales