User's Manual
Table Of Contents
- Safety Information
- General
- Controls And Display
- General Operation
- Radio Wide Features
- Conventional Features
- 5.1 Monitoring Before Transmitting
- 5.2 Monitor Mode
- 5.3 Busy Channel Lockout
- 5.4 Call Guard Squelch
- 5.5 Penalty Timer
- 5.6 Conversation Timer
- 5.7 Repeater Talk-Around
- 5.8 Displaying Transmit/Receive Frequency
- 5.9 Emergency Alarm and Call
- 5.10 Conventional Mode Scanning
- 5.11 Standard Conventional Calls
- 5.12 DTMF/ANI Signaling
- 5.13 Single Tone Encoder
- 5.14 MDC1200 Compatibility
- 5.15 Project 25 Mode Features
- 5.16 Keypad Programming
- SMARTNET/SmartZone/P25 Trunked Features
- 6.1 Analog and Digital Operation
- 6.2 Viewing Unit ID
- 6.3 Standard Group Calls
- 6.4 Private (Unit-To-Unit) Calls
- 6.5 Telephone Calls
- 6.6 Call Alert
- 6.7 Messaging
- 6.8 Sending Status Conditions
- 6.9 Emergency Alarm and Call
- 6.10 Failsoft Operation
- 6.11 SMARTNET/SmartZone/P25 Trunked Scanning Features
- 6.12 Dynamic Regrouping
- 6.13 SmartZone and P25 Trunking Unique Features
- 6.13.1 Busy Override
- 6.13.2 Site Trunking
- 6.13.3 Determining Current Site and Searching For a New Site
- 6.13.4 Locking/Unlocking a Site
- 6.13.5 ZoneFail Site Lock
- 6.13.6 P25 Wide Area Scan
- 6.13.7 Normal P25 and SmartZone Control Channel Hunt
- 6.13.8 Talkgroup Steering Via System Access Permissions
- 6.13.9 P25 Wide Area Scan
- Miscellaneous
- Determining Available Options
- 5300 ES Mobile Firmware Versions
- Password Description
- Secure Communication (Encryption)
Draft
December 2006 5300 ES Series Mobile Radio Operating Manual -3
Figure 11.1 Key Selection Example
11.1.5 FIPS and Non-FIPS Modes
FIPS 140-2 is a Federal Information Processing Standard for encrypted radios used by the
Federal Government. This standard specifies Federal security requirements for
cryptographic modules for a wide range of applications and environments. All 5300 ES
models are FIPS certified.
11.2 Encryption Keys
An encryption key is a cryptographic variable that is required by the encryption algorithm
to encrypt and decrypt voice or data. To maintain system security, these keys must be
protected from disclosure and also periodically replaced or updated.
With the AES and DES encryption used by EFJohnson radios (see Section 11.1), the same
encryption key is used by both the encrypting (sending) and decrypting (receiving) radio.
AES encryption keys are generated from a string of 64 hexadecimal characters, and DES
keys are generated from a string of 16 hexadecimal characters. Another four hexadecimal
characters are used to specify the key ID. Multiple keys can be loaded into a radio using
OTAR or manual loading.
When an encrypted message is transmitted, the encryption Algorithm ID (ALID) and key
ID (KID) are usually included in the message. This tells the receiving radio which key and
algorithm must be used to decrypt the message.
If an attempt is made to transmit a secure message without loading the corresponding key,
“KEYFAIL” is displayed. The message must then be transmitted in the clear mode (this is
possible only if the channel is strapped to “switchable”) or the key must be loaded.
Keyset ID 2
Algorithm ID
Update Item (Opt)
Time/Date (Opt)
Keyset Name (Opt)
SLN 23
SLN 25
Keyset ID 1
Algorithm ID
Update Item (Opt)
Time/Date (Opt)
Keyset Name (Opt)
Key #21: Key ID 54
Storage Loc.
SLN 24
SLN 22
SLN 21
Number (CKR)
3
5
4
2
1
PID
Key #22: Key ID 65
Key #23: Key ID 67
Key #24: Key ID 69
Key #25: Key ID 73
Key #25: Key ID 90
Key #24: Key ID 91
Key #23: Key ID 99
Key #22: Key ID 98
Key #21: Key ID 94
Crypto Group A
Keyset A1 Keyset A2
Zone 1, Chan 2
Zone 2, Chan 4
Zone 2, Chan 5
Zone 3, Chan 1
Zone 3, Chan 2