Motorola KEY 3000 User Manual page 31

Key variable loader
Table of Contents

Advertisement

Using the
KVL 3000
(continued)
ASN Operation
Chapter 2 Overview of KVL 3000
Overview of Entering and Loading Keys
Encryption keys are entered by the user into the
KVL 3000 memory locations (slots). The keys
may then be transferred (loaded) to a target
device, such as a secure radio.
A two step process is required for most
encryption keys:
D Create (enter) the multi digit encryption
key into the KVL 3000 memory
D Connect the KVL 3000 to a target device
(e.g., radio) and transfer the key to the tar
get device.
In addition, the creation and transfer of Unique
Shadow Keys (USKs), Common Shadow Keys
(CSKs), LIDs, and other refinements to the
encryption keys
are
sometimes
depending on the system requirements. The
remaining chapters in this manual describe
these additional refinements.
required
2-5

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents