Motorola V186 User Manual - Page 139

MDLC Encryption, Overview

Page 139 highlights

Communications In this case, the two nodes do not communicate through the FEP. Therefore, the FEP does not serve as a node in the system. Note that the communication between RTUs in different zones passes only through two nodes. MDLC Encryption Overview Encryption prevents any non-authorized party to communicate on MDLC network. The level of protection provided by encryption is determined by an encryption algorithm. The encryption strength is measured by the number of possible encryption keys and the key size. ACE3600 and legacy MOSCAD and MOSCAD-L RTUs can communicate using encrypted MDLC protocol. The Encryption is based on Tiny Encryption Algorithm (TEA). The information being sent within the MDLC packets is encrypted using a 128 bit encryption key. To enhance security, each RTU can store 9 replaceable encryption keys. The encryption keys can be replaced in all the RTUs in a system at the same time. Encryption is possible on all the types of communication links that use MDLC protocol. MDLC data encryption is supported by: • ACE3600 • MOSCAD IP Gateway • MOSCAD (CPU420) • MOSCAD-L (CPU020) Only encrypted RTUs / IP Gateways that are using the same Encryption Key are able to exchange data and commands An RTU that receives data or a command from another encrypted RTU that uses a different key (or from a non-encrypted RTU) will reject the received data or command. 135

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185

Communications
In this case, the two nodes do not communicate through the FEP. Therefore, the FEP does
not serve as a node in the system. Note that the communication between RTUs in
different zones passes only through two nodes.
MDLC Encryption
Overview
Encryption prevents any non-authorized party to communicate on MDLC network. The
level of protection provided by encryption is determined by an encryption algorithm. The
encryption strength is measured by the number of possible encryption keys and the key
size.
ACE3600 and legacy MOSCAD and MOSCAD-L RTUs can communicate using
encrypted MDLC protocol. The Encryption is based on Tiny Encryption Algorithm
(TEA). The information being sent within the MDLC packets is encrypted using a 128 bit
encryption key. To enhance security, each RTU can store 9 replaceable encryption keys.
The encryption keys can be replaced in all the RTUs in a system at the same time.
Encryption is possible on all the types of communication links that use MDLC protocol.
MDLC data encryption is supported by:
ACE3600
MOSCAD IP Gateway
MOSCAD (CPU420)
MOSCAD-L (CPU020)
Only encrypted RTUs / IP Gateways that are using the same Encryption Key are able to
exchange data and commands An RTU that receives data or a command from another
encrypted RTU that uses a different key (or from a non-encrypted RTU) will reject the
received data or command.
135