Avaya Configuring Data Encryption Services Bedienungsanleitung Seite 21

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 62
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 20
Data Encryption Overview
117386-A Rev. A
1-5
Figure 1-1. Hierarchy of Encryption Keys
The keys are the
Node Protection Key (NPK). It encrypts the LTSS.
Long-Term Shared Secret (LTSS). It is the sourcefor the Master Encryption
Key.
Master Encryption Key (MEK). It encrypts the Traffic Encryption Key.
Traffic Encryption Key (TEK). The TEK encrypts the data that travels across
the network.
Random Number Generators (RNGs)
RNGs generate values for the keys. These values are statistically random. An
RNG uses as its source a
seed
that you supply. Refer to
Creating Seeds” in
Cha
pter 3 for instructions.
Site Manager uses two of the RNGs to generate NPKs and LTSSs. The router uses
the third RNG to generate TEKs.
WEP0001A
Billerica: NPK
Santa Clara: NPK
Billerica-SC: LTSS
Billerica-NY: LTSS
.....
1
2
12
12
23
24
13
FR or PPP
Site Manager
Santa Clara
Billerica
2
NPK
1
NPK
LTSS
LTSS
LTSS
12
12
13
14
LTSS
LTSS
LTSS
TEK Data
KEK=(LTSS , TIME)
Seitenansicht 20
1 2 ... 16 17 18 19 20 21 22 23 24 25 26 ... 61 62

Kommentare zu diesen Handbüchern

Keine Kommentare