EasyManuals Logo

Kenwood NX-5200K3 Function Reference

Kenwood NX-5200K3
190 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #143 background imageLoading...
Page #143 background image
3.6
Enhanced Encryption
The ARC4-format encryption function can be used by enabling Enhanced Encryption using the KPG-D1/ D1N.
The
Enhanced Encryption type is the encryption type that is defined by the DMR Association, and is the Encryption function
using a 40 bit encryption key.
The ARC4 encryption function enables encryption or decryption of communication data during voice or data communication
by configuring the Encryption Key (Key ID, Key Data) in the Multi-key List. The transceiver is able to store up to 32 ARC4
Encryption Keys (Key ID, Key Data). (Refer to Multi-key List.)
Note
0
Enhanced Encryption is the function to convert audio data or communication data to encrypted data. ARC4 (Alleged
RC4) used for Enhanced Encryption and RC4 use the same encryption type. Secrecy in communications can be
enhanced by encryption.
0
“RC4” is a registered trademark of RSA Security LLC.
Configuration using KPG-D1/ D1N
Configuring Enhanced Encryption to be enabled or disabled ( Model > Product Information > Feature Selection)
3.7
Protection Function of Encryption Key (Key Retention)
Key Retention is
the function for retaining or deleting Encryption Key information stored in the SCM or the Encryption Key
of Built-in DES or Enhanced Encryption according to the configuration of the KPG-D1/ D1N.
Using this function, Encryption Key data can automatically be deleted, for instance, in case the transceiver is stolen or the
transceiver has been left unused.
The behavior of the transceiver varies depending on the configuration in Key Retention as shown below:
SCM
0
Disable
Since the security level is high, this configuration (Disable) is the default.
If the SCM is configured, the encryption key data is deleted when Tamper is detected or when the ESN is determined
as inconsistent.
The behavior specifications of when Tamper is detected under each condition are as follows:
Table 3-4 Behavior Specifications
Power Off
About Encryption Key Data
Conditions
With the battery removed
Less than 30 sec (power off time)
The encryption key data is still retained when the
transceiver is turned ON again.
Elapse of 30 sec or more (power off
time)
The encryption key data is deleted when the
transceiver is turned ON again.
If the SCM is temporarily removed
The encryption key data is deleted when the
transceiver is turned ON again.
With the battery attached
Less than 30 sec (power off time)
The encryption key data is still retained when the
transceiver is turned ON again.
Elapse of 30 sec or more (power off
time)
The encryption key data is still retained when the
transceiver is turned ON again.
If the SCM is temporarily removed
The encryption key data is deleted when the
transceiver is turned ON again.
3 COMMUNICATION SECURITY
3.6 Enhanced Encryption
DMR FUNC (K, F)/Ver 2.20 126
CONTENTS INDEX

Table of Contents

Other manuals for Kenwood NX-5200K3

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Kenwood NX-5200K3 and is the answer not in the manual?

Kenwood NX-5200K3 Specifications

General IconGeneral
BrandKenwood
ModelNX-5200K3
CategoryTransceiver
LanguageEnglish

Related product manuals